8.1
CVSS 3.1
Share
CVSS VectorNVD
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Lifecycle Timeline
6
Analysis Updated
Apr 16, 2026 - 06:34 EUVD-patch-fix
executive_summary
Re-analysis Queued
Apr 16, 2026 - 05:29 backfill_euvd_patch
patch_released
patch_available
Apr 16, 2026 - 05:29 EUVD
7.0
Analysis Generated
Mar 16, 2026 - 03:19 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 03:19 euvd
EUVD-2025-20098
CVE Published
Jul 05, 2025 - 00:15 nvd
HIGH 8.1
DescriptionNVD
Tunnelblick 3.5beta06 before 7.0, when incompletely uninstalled, allows attackers to execute arbitrary code as root (upon the next boot) by dragging a crafted Tunnelblick.app file into /Applications.
AnalysisAI
A remote code execution vulnerability (CVSS 8.1) that allows attackers. High severity vulnerability requiring prompt remediation.
Technical ContextAI
Vulnerability type: remote code execution. CVSS 8.1 indicates high severity.
RemediationAI
Monitor vendor channels for patch availability.
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2025-20098