{"uuid": "9ace3b3e-b5ce-4553-b70b-8f2907acae40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0651", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2598", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0651\n\ud83d\udd39 Description: Improper Privilege Management vulnerability in Cloudflare WARP on Windows allows File Manipulation.\n\nUser with a low system privileges\u00a0 can create a set of symlinks inside the\u00a0C:\\ProgramData\\Cloudflare\\warp-diag-partials folder. After triggering the 'Reset all settings\" option the WARP service will delete the files that the symlink was pointing to. Given the WARP service operates with System privileges this might lead to deleting files owned by the System user.\nThis issue affects WARP: before 2024.12.492.0.\n\ud83d\udccf Published: 2025-01-22T17:34:16.705Z\n\ud83d\udccf Modified: 2025-01-22T17:35:44.533Z\n\ud83d\udd17 References:\n1. https://developers.cloudflare.com/warp-client/", "creation_timestamp": "2025-01-22T18:02:26.000000Z"}