No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 18 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Malwarebytes
Malwarebytes adwcleaner |
|
| Vendors & Products |
Malwarebytes
Malwarebytes adwcleaner |
Tue, 17 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-269 | |
| Metrics |
cvssV3_1
|
Tue, 17 Feb 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a related issue to CVE-2023-28892. To exploit this, an attacker must create a file in a given folder path and intercept the application log file deletion flow. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-17T18:55:56.791Z
Reserved: 2025-12-15T00:00:00.000Z
Link: CVE-2025-67905
Updated: 2026-02-17T18:54:12.371Z
Status : Awaiting Analysis
Published: 2026-02-17T17:21:04.340
Modified: 2026-02-18T17:52:22.253
Link: CVE-2025-67905
No data.
OpenCVE Enrichment
Updated: 2026-02-18T10:44:18Z