Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a related issue to CVE-2023-28892. To exploit this, an attacker must create a file in a given folder path and intercept the application log file deletion flow.
History

Tue, 17 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269
Metrics cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Feb 2026 17:00:00 +0000

Type Values Removed Values Added
Description Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a related issue to CVE-2023-28892. To exploit this, an attacker must create a file in a given folder path and intercept the application log file deletion flow.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-02-17T00:00:00.000Z

Updated: 2026-02-17T18:55:56.791Z

Reserved: 2025-12-15T00:00:00.000Z

Link: CVE-2025-67905

cve-icon Vulnrichment

Updated: 2026-02-17T18:54:12.371Z

cve-icon NVD

Status : Received

Published: 2026-02-17T17:21:04.340

Modified: 2026-02-17T20:22:04.710

Link: CVE-2025-67905

cve-icon Redhat

No data.