Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.1 and below, a critical security vulnerability exists in password handling mechanisms. During encrypted sandbox creation, user passwords are transmitted via shared memory, exposing them to potential interception. The vulnerability is particularly severe during password modification operations, where both old and new passwords are passed as plaintext command-line arguments to the Imbox process without any encryption or obfuscation. This implementation flaw allows any process within the user session, including unprivileged processes, to retrieve these sensitive credentials by reading the command-line arguments, thereby bypassing standard privilege requirements and creating a significant security risk. This is fixed in version 1.16.2.
References
Configurations
History
04 Aug 2025, 17:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:a:sandboxie-plus:sandboxie:*:*:*:*:plus:*:*:* | |
References | () https://github.com/sandboxie-plus/Sandboxie/commit/d107d5743880da28e782c1771b5246b2a512989a - Patch | |
References | () https://github.com/sandboxie-plus/Sandboxie/releases/tag/v1.16.2 - Release Notes | |
References | () https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-jp7r-vgv9-43p7 - Vendor Advisory | |
First Time |
Sandboxie-plus
Sandboxie-plus sandboxie |
29 Jul 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-jp7r-vgv9-43p7 - |
29 Jul 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-29 13:15
Updated : 2025-08-04 17:30
NVD link : CVE-2025-54422
Mitre link : CVE-2025-54422
CVE.ORG link : CVE-2025-54422
JSON object : View
Products Affected
sandboxie-plus
- sandboxie