CVE-2025-67905

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to gain full control of a system by tricking a legitimate application into deleting a log file in a location they control. To exploit this, the attacker needs to create a specific file in a designated folder and then wait for the application to delete its logs, which it does with elevated permissions.

Technical Description

Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a related issue to CVE-2023-28892. To exploit this, an attacker must create a file in a given folder path and intercept the application log file deletion flow.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactLow
ScopeChanged

Vector String

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,579($1K-$5K)
Vendor Response
Grade APatched in 1 day

Quick Information

Published

Feb 17, 2026

about 2 months ago

Last Modified

Feb 18, 2026

about 2 months ago