PT-2025-25226 · Gnu +1 · Http Request2 +1
Egor Filatov
·
Published
2025-03-14
·
Updated
2025-07-10
·
CVE-2025-43711
8.1
High
Base vector | Vector | AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Tunnelblick versions 3.5beta06 through 6.x
Tunnelblick version 7.0 and earlier
Description:
The issue is related to the HTTP Request2 library used for processing HTTP requests in the Tunnelblick VPN client. It involves information disclosure through the tests/ network/getparameters.php and tests/ network/postparameters.php test directory. Exploitation of this issue can allow a remote attacker to conduct a cross-site scripting (XSS) attack and potentially elevate privileges to the root level.
Recommendations:
For Tunnelblick versions 3.5beta06 through 6.x, completely uninstall the previous version before installing a newer version to prevent potential exploitation.
For Tunnelblick version 7.0 and earlier, ensure that any incomplete uninstallation does not leave behind exploitable components, and consider upgrading to a version where this issue is resolved.
As a temporary workaround, consider restricting access to the tests/ network directory to minimize the risk of exploitation.
Fix
Related Identifiers
Affected Products
References · 11
- https://nvd.nist.gov/vuln/detail/CVE-2025-43711 · Security Note
- https://bdu.fstec.ru/vul/2025-04879 · Security Note
- https://twitter.com/cracbot/status/1943263975807877339 · Twitter Post
- https://github.com/advisories/GHSA-w7gh-f2fm-9q8r · Note
- https://tunnelblick.net/downloads.html · Note
- https://t.me/cvenotify/127741 · Telegram Post
- https://twitter.com/transilienceai/status/1941346615794798999 · Twitter Post
- https://twitter.com/transilienceai/status/1941346627824001517 · Twitter Post
- https://twitter.com/VulmonFeeds/status/1941361928409948340 · Twitter Post
- https://tunnelblick.net/cCVE-2025-43711.html · Note
- https://twitter.com/CVEnew/status/1941282019805139454 · Twitter Post