Mozilla Vpn vulnerabilities
4 known vulnerabilities affecting mozilla/vpn.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH3MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2025-5687HIGHCVSS 7.8fixed in 2.28.02025-06-11
CVE-2025-5687 [HIGH] CWE-269 CVE-2025-5687: A vulnerability in Mozilla VPN on macOS allows privilege escalation from a normal user to root.
*Thi
A vulnerability in Mozilla VPN on macOS allows privilege escalation from a normal user to root.
*This bug only affects Mozilla VPN on macOS. Other operating systems are unaffected.* This vulnerability affects Mozilla VPN 2.28.0 < (macOS).
nvd
CVE-2023-4104MEDIUMCVSS 5.5fixed in 2.16.12023-09-11
CVE-2023-4104 [MEDIUM] CWE-862 CVE-2023-4104: An invalid Polkit Authentication check and missing authentication requirements for D-Bus methods all
An invalid Polkit Authentication check and missing authentication requirements for D-Bus methods allowed any local user to configure arbitrary VPN setups.
*This bug only affects Mozilla VPN on Linux. Other operating systems are unaffected.* This vulnerability affects Mozilla VPN 2.16.1 < (Linux).
nvd
CVE-2022-0517HIGHCVSS 7.8fixed in 2.7.12022-12-22
CVE-2022-0517 [HIGH] CWE-434 CVE-2022-0517: Mozilla VPN can load an OpenSSL configuration file from an unsecured directory. A user or attacker w
Mozilla VPN can load an OpenSSL configuration file from an unsecured directory. A user or attacker with limited privileges could leverage this to launch arbitrary code with SYSTEM privilege. This vulnerability affects Mozilla VPN < 2.7.1.
nvd
CVE-2020-15679HIGHCVSS 7.6fixed in 1.0.7_\(929\)fixed in 1.2.2+2 more2022-12-22
CVE-2020-15679 [HIGH] CWE-384 CVE-2020-15679: An OAuth session fixation vulnerability existed in the VPN login flow, where an attacker could craft
An OAuth session fixation vulnerability existed in the VPN login flow, where an attacker could craft a custom login URL, convince a VPN user to login via that URL, and obtain authenticated access as that user. This issue is limited to cases where attacker and victim are sharing the same source IP and could allow the ability to view session states and
nvd