CVE-2025-32780

7.3 HIGH

📋 TL;DR

BleachBit for Windows up to version 4.6.2 is vulnerable to DLL hijacking, allowing attackers to execute arbitrary code by placing a malicious uuid.dll in a specific directory. This affects Windows users running vulnerable versions of BleachBit, potentially compromising their systems when the application launches.

💻 Affected Systems

Products:
  • BleachBit
Versions: Up to version 4.6.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Requires attacker to place malicious DLL in C:\Users\<username>\AppData\Local\Microsoft\WindowsApps\

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running BleachBit, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to user account compromise, data exfiltration, or malware installation on the affected system.

🟢

If Mitigated

Limited impact if proper application whitelisting, DLL search path hardening, or user privilege restrictions are in place.

🌐 Internet-Facing: LOW - This requires local access or social engineering to place the malicious DLL, not directly exploitable over the internet.
🏢 Internal Only: MEDIUM - Internal attackers with access to user directories could exploit this, but requires specific conditions and user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local file system access to place the malicious DLL and user to run BleachBit. No authentication bypass needed once DLL is placed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9.0

Vendor Advisory: https://github.com/bleachbit/bleachbit/security/advisories/GHSA-ghph-v4x4-vr3c

Restart Required: No

Instructions:

1. Download BleachBit 4.9.0 or later from official sources. 2. Uninstall previous version. 3. Install new version. 4. Verify version is 4.9.0 or higher.

🔧 Temporary Workarounds

Restrict DLL search path

windows

Use Windows policies to restrict DLL search order and prevent loading from user directories

Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -Name 'SafeDllSearchMode' -Value 1

Remove vulnerable directory permissions

windows

Restrict write permissions to the WindowsApps directory for standard users

icacls "C:\Users\%USERNAME%\AppData\Local\Microsoft\WindowsApps" /deny %USERNAME%:(OI)(CI)W

🧯 If You Can't Patch

  • Monitor for suspicious DLL files in C:\Users\*\AppData\Local\Microsoft\WindowsApps\ directory
  • Implement application control policies to restrict execution of BleachBit or validate DLL integrity

🔍 How to Verify

Check if Vulnerable:

Check BleachBit version in Help > About. If version is 4.6.2 or lower, system is vulnerable.

Check Version:

bleachbit --version

Verify Fix Applied:

Verify BleachBit version is 4.9.0 or higher. Check that uuid.dll is not present in WindowsApps directory.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing BleachBit loading DLLs from unexpected locations
  • Process creation events for BleachBit with suspicious parent processes

Network Indicators:

  • Unexpected outbound connections from BleachBit process

SIEM Query:

Process WHERE process_name = 'bleachbit.exe' AND (file_path CONTAINS 'WindowsApps' OR parent_process NOT IN ('explorer.exe', 'cmd.exe'))

🔗 References

📤 Share & Export