CVE-2025-54374

8.8 HIGH

📋 TL;DR

CVE-2025-54374 is a one-click remote code execution vulnerability in Eidos Personal Data Management framework. Attackers can embed malicious eidos: URLs on websites to trigger the application's custom URL handler, executing arbitrary code on victims' machines when they visit the site or click the link. All users running Eidos versions 0.21.0 and below are affected.

💻 Affected Systems

Products:
  • Eidos Personal Data Management Framework
Versions: 0.21.0 and below
Operating Systems: All platforms where Eidos is installed
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the custom URL handler registration and processing mechanism. Any system with Eidos installed and registered as a URL handler is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code with the privileges of the Eidos application user, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Attackers create malicious websites or embed malicious links in phishing emails to compromise users who click them, leading to credential theft, data exfiltration, or lateral movement within networks.

🟢

If Mitigated

With proper network segmentation, application sandboxing, and user privilege restrictions, impact could be limited to the compromised user's context without affecting critical systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only a malicious website or link. The advisory includes technical details that could be used to create working exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available as of October 3, 2025

Vendor Advisory: https://github.com/mayneyao/eidos/security/advisories/GHSA-qhhm-56qp-xr2r

Restart Required: No

Instructions:

No official patch available. Monitor the GitHub security advisory for updates and apply any future patches immediately.

🔧 Temporary Workarounds

Unregister Eidos URL Handler

all

Remove the eidos: protocol handler registration from the operating system to prevent automatic launching of the application from malicious URLs.

Windows: reg delete "HKCU\Software\Classes\eidos" /f
Linux: Remove or modify .desktop files and mimeapps.list entries for eidos protocol

Browser URL Handler Blocking

all

Configure browsers to block or prompt before launching external applications from eidos: URLs.

Firefox: about:config -> network.protocol-handler.external.eidos = false
Chrome: chrome://settings/handlers -> Block eidos protocol

🧯 If You Can't Patch

  • Uninstall Eidos completely until a patch is available
  • Implement network filtering to block eidos: protocol traffic at perimeter firewalls and web proxies

🔍 How to Verify

Check if Vulnerable:

Check Eidos version: eidos --version. If version is 0.21.0 or lower, system is vulnerable. Also check if eidos: protocol handler is registered in OS.

Check Version:

eidos --version

Verify Fix Applied:

No fix available to verify. When patch becomes available, verify version is above 0.21.0 and test that eidos: URLs no longer execute arbitrary code.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Eidos process launches from browser processes
  • Eidos executing with unusual command-line arguments
  • Network connections from Eidos to unexpected external IPs

Network Indicators:

  • HTTP/HTTPS traffic containing eidos: URLs
  • DNS requests for domains associated with known exploit kits

SIEM Query:

process_name:"eidos" AND parent_process_name IN ("chrome.exe", "firefox.exe", "msedge.exe", "safari")

🔗 References

📤 Share & Export