CVE-2025-66005

N/A Unknown

📋 TL;DR

This vulnerability in InputPlumber's D-Bus interface allows local attackers to bypass authorization checks. Attackers can cause denial-of-service, leak sensitive information, or potentially escalate privileges within the current user session. Only systems running vulnerable versions of InputPlumber are affected.

💻 Affected Systems

Products:
  • InputPlumber
Versions: All versions before v0.63.0
Operating Systems: Linux distributions using InputPlumber
Default Config Vulnerable: ⚠️ Yes
Notes: Requires InputPlumber to be running with D-Bus interface enabled (default configuration).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privilege escalation within the current user session, allowing attackers to execute arbitrary code with the user's privileges.

🟠

Likely Case

Local denial-of-service attacks disrupting input functionality or information leaks exposing session data.

🟢

If Mitigated

Limited impact with proper D-Bus security policies and user session isolation in place.

🌐 Internet-Facing: LOW - This is a local-only vulnerability requiring access to the D-Bus interface.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this on shared systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the D-Bus interface but no authentication to InputPlumber itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.63.0

Vendor Advisory: https://security.opensuse.org/2026/01/09/inputplumber-lack-of-dbus-auth.html

Restart Required: Yes

Instructions:

1. Update InputPlumber to version 0.63.0 or later using your distribution's package manager. 2. Restart InputPlumber service or reboot the system.

🔧 Temporary Workarounds

Restrict D-Bus access

linux

Configure D-Bus security policies to restrict access to InputPlumber's interface

sudo systemctl edit inputplumber.service
Add D-Bus security policy restrictions in the override file

Disable InputPlumber D-Bus interface

linux

Disable the vulnerable D-Bus interface if not required

sudo systemctl stop inputplumber
sudo systemctl disable inputplumber

🧯 If You Can't Patch

  • Implement strict D-Bus security policies to limit interface access to trusted users only
  • Isolate user sessions and limit local access to systems running vulnerable versions

🔍 How to Verify

Check if Vulnerable:

Check InputPlumber version: inputplumber --version or check package version via distribution package manager

Check Version:

inputplumber --version 2>/dev/null || dpkg -l | grep inputplumber || rpm -q inputplumber

Verify Fix Applied:

Verify InputPlumber version is 0.63.0 or later and check D-Bus interface authorization is properly configured

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized D-Bus method calls to InputPlumber interface
  • InputPlumber service crashes or abnormal behavior

Network Indicators:

  • Local D-Bus traffic to InputPlumber interface from unexpected processes

SIEM Query:

process:inputplumber AND (event_type:dbus_access OR error:permission_denied)

🔗 References

📤 Share & Export