CVE Vulnerabilities

CVE-2025-15595

Weak Authentication

Published: Mar 03, 2026 | Modified: Mar 03, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Privilege escalation via dll hijacking in Inno Setup 6.2.1 and ealier versions.

Weakness

The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does not sufficiently prove that the claimed identity is correct.

Extended Description

Attackers may be able to bypass weak authentication faster and/or with less effort than expected.

References