{"uuid": "26318c49-5e51-4f91-82ec-e6c796c5ea8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0651", "type": "seen", "source": "https://t.me/cvedetector/16136", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0651 - Cloudflare WARP Windows Privilege Escalation File Manipulation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0651 \nPublished : Jan. 22, 2025, 6:15 p.m. | 27\u00a0minutes ago \nDescription : Improper Privilege Management vulnerability in Cloudflare WARP on Windows allows File Manipulation.  \n  \nUser with a low system privileges\u00a0 can create a set of symlinks inside the\u00a0C:\\ProgramData\\Cloudflare\\warp-diag-partials folder. After triggering the 'Reset all settings\" option the WARP service will delete the files that the symlink was pointing to. Given the WARP service operates with System privileges this might lead to deleting files owned by the System user.  \nThis issue affects WARP: before 2024.12.492.0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T19:44:54.000000Z"}