{"uuid": "9996f3d7-97b0-4de2-b4d5-fc77a168e861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-60710", "type": "published-proof-of-concept", "source": "https://t.me/P0x3k_1N73LL1G3NC3/196", "content": "CVE-2025-60710 Local Privilege Escalation in Taskhost Windows Tasks\n\nThis is PoC for local privilege escalation vulnerability in \\Microsoft\\Windows\\WindowsAI\\Recall\\PolicyConfiguration scheduled task.\nWhen this scheduled task is started the taskhostw.exe process whill try to open the C:\\Users\\%username%\\AppData\\Local\\CoreAIPlatform.00\\UKP directory and search for directories using the following filter: {????????-????-????-????-????????????}. If that directory is found it will be deleted without checking for symbolic links.\nAs low privilege user by default can create directories in their own %LOCALAPPDATA% folder this leads to arbitrary folder delete in context of NT AUTHORITY\\SYSTEM user.", "creation_timestamp": "2025-11-12T09:10:47.000000Z"}