CVE-2025-0396

7.8 HIGH

📋 TL;DR

This critical vulnerability in exelban stats allows local attackers to execute arbitrary commands through command injection in the XPC Service component. It affects users of stats versions up to 2.11.21 on macOS systems. Successful exploitation could lead to local privilege escalation.

💻 Affected Systems

Products:
  • exelban stats
Versions: up to 2.11.21
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the XPC Service component; requires local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains root privileges, installs persistent malware, accesses sensitive data, and compromises the entire system.

🟠

Likely Case

Local user or malware with user-level access escalates privileges to install additional payloads, modify system settings, or access protected resources.

🟢

If Mitigated

Attack limited to user-level operations if proper privilege separation and sandboxing are in place, but command injection still possible.

🌐 Internet-Facing: LOW - This is a local host vulnerability requiring local access to exploit.
🏢 Internal Only: HIGH - Any user or malware with local access can potentially exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of command injection techniques; no public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.11.22

Vendor Advisory: https://github.com/exelban/stats/releases/tag/v2.11.22

Restart Required: No

Instructions:

1. Open stats application. 2. Check for updates in settings or about menu. 3. Download and install version 2.11.22 from GitHub releases. 4. Restart the application if prompted.

🔧 Temporary Workarounds

Disable stats XPC Service

macOS

Temporarily disable the vulnerable XPC Service component to prevent exploitation

sudo launchctl unload /Library/LaunchDaemons/com.exelban.stats.plist
sudo rm /Library/LaunchDaemons/com.exelban.stats.plist

🧯 If You Can't Patch

  • Uninstall stats completely until patching is possible
  • Implement strict local access controls and monitor for suspicious process execution

🔍 How to Verify

Check if Vulnerable:

Check stats version in application settings or via 'defaults read /Applications/stats.app/Contents/Info.plist CFBundleShortVersionString'

Check Version:

defaults read /Applications/stats.app/Contents/Info.plist CFBundleShortVersionString

Verify Fix Applied:

Confirm version is 2.11.22 or higher using the same command

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from stats XPC Service
  • Command injection patterns in system logs
  • Privilege escalation attempts

Network Indicators:

  • Local inter-process communication anomalies

SIEM Query:

process.name:stats AND (process.args:*;* OR process.args:*|* OR process.args:*`*)

🔗 References

📤 Share & Export