CVE-2025-50505

7.8 HIGH

📋 TL;DR

This vulnerability allows local users to execute arbitrary commands with elevated privileges by exploiting an unauthorized HTTP API endpoint in Clash Verge Rev. Attackers can submit malicious bin_path parameters that get passed directly to the system service for execution. Users running Clash Verge Rev versions through 2.2.3 are affected.

💻 Affected Systems

Products:
  • Clash Verge Rev
Versions: through 2.2.3
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation with clash-verge-service enabled. Requires local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root/system privileges, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement.

🟠

Likely Case

Local user or malware with basic access escalates privileges to install additional payloads, modify system configurations, or access protected resources.

🟢

If Mitigated

Attack fails due to proper access controls, service isolation, or network segmentation limiting local attack surface.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access but is straightforward once access is obtained. Public proof-of-concept available on GitHub.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.0

Vendor Advisory: https://github.com/clash-verge-rev/clash-verge-rev

Restart Required: Yes

Instructions:

1. Update Clash Verge Rev to version 2.3.0 or later. 2. Restart the application and clash-verge-service. 3. Verify the service is no longer vulnerable.

🔧 Temporary Workarounds

Disable clash-verge-service

linux

Stop and disable the vulnerable system service to prevent exploitation.

sudo systemctl stop clash-verge-service
sudo systemctl disable clash-verge-service

Block local HTTP API access

linux

Use firewall rules to block access to the unauthorized HTTP API endpoint.

sudo iptables -A INPUT -p tcp --dport [API_PORT] -j DROP

🧯 If You Can't Patch

  • Remove Clash Verge Rev from affected systems entirely.
  • Implement strict local access controls and monitor for suspicious service activity.

🔍 How to Verify

Check if Vulnerable:

Check if Clash Verge Rev version is 2.2.3 or earlier and clash-verge-service is running with HTTP API accessible locally.

Check Version:

clash-verge-rev --version

Verify Fix Applied:

Confirm version is 2.3.0 or later and test that the /start_clash endpoint no longer accepts arbitrary bin_path parameters.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from clash-verge-service
  • HTTP requests to /start_clash endpoint with suspicious parameters

Network Indicators:

  • Local HTTP traffic to clash-verge-service API port with bin_path parameter

SIEM Query:

process_name="clash-verge-service" AND command_line CONTAINS "bin_path"

🔗 References

📤 Share & Export