CVE-2020-25989
HIGHPritunl-client-electron < 1.2.2550.20 - Symlink Following
Title source: ruleDescription
Privilege escalation via arbitrary file write in pritunl electron client 1.0.1116.6 through v1.2.2550.20. Successful exploitation of the issue may allow an attacker to execute code on the effected system with root privileges.
References (2)
Core 2
Core References
Exploit, Third Party Advisory x_refsource_misc
https://vkas-afk.github.io/vuln-disclosures/
Patch, Third Party Advisory x_refsource_confirm
https://github.com/pritunl/pritunl-client-electron/commit/89f8c997c6f93e724f68f76f7f47f8891d9acc2d
Scores
CVSS v3
7.8
EPSS
0.0025
EPSS Percentile
48.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-59
Status
published
Products (1)
pritunl/pritunl-client-electron
1.0.1116.6 - 1.2.2550.20
Published
Nov 19, 2020
Tracked Since
Feb 18, 2026