Impact
An uncontrolled search path element in the TrackerUpdate process allows a local attacker who has already obtained a low‑privilege execution environment to load an attacker‑controlled library from an unsecured location. This flaw can raise the privilege level of the attacker’s code to that of the target user, enabling the attacker to run arbitrary code with elevated rights. The weakness is consistent with CWE‑427, which describes problems related to the ability to influence or control the library search path used by an application.
Affected Systems
PDF‑XChange Editor is the affected product. No specific version information or additional vendor details are supplied in this report, so any installation of PDF‑XChange Editor that contains the default TrackerUpdate behavior is potentially vulnerable.
Risk and Exploitability
The calculated CVSS score is 7.3, indicating a high severity vulnerability when the conditions are met. The EPSS score is below 1 %, and the vulnerability is not listed in the CISA KEV catalog, suggesting that it is not widely exploited in the wild. However, exploitation requires the attacker to have local code execution already, which is plausible if the attacker has compromised an application or executed a malicious script on the system. Therefore the primary risk is to users who have inadvertently run untrusted code or who have been infected by malware capable of low‑privilege execution.
OpenCVE Enrichment