CVE-2025-14498

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on TradingView Desktop installations by exploiting an uncontrolled search path in the Electron framework. Attackers who already have low-privileged code execution can load malicious scripts from unsecured locations to gain higher privileges. Only TradingView Desktop users are affected.

💻 Affected Systems

Products:
  • TradingView Desktop
Versions: Versions prior to the patched release (specific version not specified in advisory)
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of TradingView Desktop using Electron framework are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full system control, installs persistent malware, accesses sensitive data, and pivots to other systems.

🟠

Likely Case

Local attacker elevates to user-level privileges, accesses user files, and potentially installs cryptocurrency miners or credential stealers.

🟢

If Mitigated

Attack limited to initial compromise scope with proper privilege separation and application sandboxing.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring existing local access.
🏢 Internal Only: MEDIUM - Internal attackers with initial access can exploit this to gain higher privileges on workstations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local code execution first, then exploitation of DLL/script search order hijacking.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version from TradingView (check vendor advisory)

Vendor Advisory: https://www.tradingview.com/support/

Restart Required: Yes

Instructions:

1. Open TradingView Desktop. 2. Check for updates in settings. 3. Install latest version. 4. Restart application.

🔧 Temporary Workarounds

Remove vulnerable version

all

Uninstall TradingView Desktop until patched version is available

sudo apt remove tradingview-desktop
brew uninstall tradingview
Use system uninstaller on Windows

Restrict application permissions

linux

Run TradingView Desktop with minimal privileges using sandboxing

firejail tradingview-desktop
sandbox-exec -n tradingview

🧯 If You Can't Patch

  • Run TradingView Desktop with limited user account (not admin/root)
  • Monitor for unusual process creation from TradingView executable

🔍 How to Verify

Check if Vulnerable:

Check TradingView Desktop version - if not latest, assume vulnerable. Check for ZDI-CAN-27395 advisory references.

Check Version:

Check 'About' section in TradingView Desktop or package manager version

Verify Fix Applied:

Verify TradingView Desktop is updated to latest version and no longer references vulnerable Electron configuration.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DLL/script loading from non-standard paths
  • TradingView process spawning unexpected child processes
  • Privilege escalation attempts from TradingView context

Network Indicators:

  • None - this is local exploitation only

SIEM Query:

Process creation where parent_process contains 'tradingview' and (process contains 'cmd.exe' or process contains 'powershell.exe' or process contains 'bash')

🔗 References

📤 Share & Export