CVE-2025-56503

6.5 MEDIUM

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Sublime Text 4 where authenticated users with low-level privileges could potentially replace the uninstall executable with a malicious binary to gain administrator privileges. The vulnerability is disputed by the vendor who claims replacing the uninstall file already requires administrator permissions. Affects Sublime Text 4 users on Windows systems.

💻 Affected Systems

Products:
  • Sublime HQ Pty Ltd Sublime Text 4
Versions: Version 4200
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Vendor disputes the vulnerability, claiming replacing uninstall files requires administrator permissions. Exploitation likely requires misconfigured file permissions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full administrator privileges on the system, enabling complete system compromise, data theft, and persistence.

🟠

Likely Case

Limited impact due to vendor dispute and requirement for initial low-level access; most likely scenario involves attackers already having some system access attempting privilege escalation.

🟢

If Mitigated

No impact if proper file permissions prevent modification of installation directory or if users operate with minimal privileges.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access to the system.
🏢 Internal Only: MEDIUM - Internal users with low-level access could potentially exploit this if file permissions are misconfigured.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires authenticated access and ability to write to Sublime Text installation directory. GitHub repository contains proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available - vendor disputes vulnerability

Restart Required: No

Instructions:

No official patch available. Vendor considers this not a vulnerability. Monitor for updates if vendor changes position.

🔧 Temporary Workarounds

Restrict installation directory permissions

windows

Set proper file permissions on Sublime Text installation directory to prevent unauthorized modifications

icacls "C:\Program Files\Sublime Text 4" /deny Users:(OI)(CI)(WD,AD)

Run with minimal privileges

all

Ensure users operate with standard user privileges rather than administrator accounts

🧯 If You Can't Patch

  • Implement principle of least privilege - ensure users don't have write access to program installation directories
  • Monitor file system changes to Sublime Text installation directory using file integrity monitoring tools

🔍 How to Verify

Check if Vulnerable:

Check if current user has write permissions to Sublime Text installation directory (typically C:\Program Files\Sublime Text 4)

Check Version:

Open Sublime Text and check Help > About Sublime Text or run: "C:\Program Files\Sublime Text 4\sublime_text.exe" --version

Verify Fix Applied:

Verify that standard users cannot modify files in Sublime Text installation directory

📡 Detection & Monitoring

Log Indicators:

  • File modification events in Sublime Text installation directory
  • Creation of unexpected executables in program folders

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=4663 OR EventID=4656 AND ObjectName LIKE '%Sublime Text 4%' AND AccessMask IN ('0x2', '0x100')

🔗 References

📤 Share & Export