CVE-2025-15595

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to gain higher privileges on a system by tricking it into loading a malicious file instead of a legitimate one when using Inno Setup version 6.2.1 or earlier. To exploit this, the attacker needs access to the same directory as the Inno Setup application, making it crucial for users to ensure their environments are secure from unauthorized access.

Technical Description

Privilege escalation via dll hijacking in Inno Setup 6.2.1 and ealier versions.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:Clear

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$793($500-$1K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Mar 3, 2026

about 1 month ago

Last Modified

Mar 3, 2026

about 1 month ago