{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T16:37:22.589","vulnerabilities":[{"cve":{"id":"CVE-2025-26168","sourceIdentifier":"cve@mitre.org","published":"2025-05-07T19:16:07.290","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"IXON VPN Client before 1.4.4 on Linux and macOS allows Local Privilege Escalation to root because there is code execution from a configuration file that can be controlled by a low-privileged user. There is a race condition in which a temporary configuration file, in a world-writable directory, can be overwritten."},{"lang":"es","value":"IXON VPN Client anterior a la versión 1.4.4 en Linux y macOS permite la escalada de privilegios locales al usuario root porque se ejecuta código desde un archivo de configuración que puede ser controlado por un usuario con pocos privilegios. Existe una condición de ejecución que permite sobrescribir un archivo de configuración temporal, ubicado en un directorio con permisos de escritura universal."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.4,"impactScore":6.0}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-732"}]}],"references":[{"url":"https://ixon-cloud.my.salesforce.com/sfc/p/#1t000000vlSF/a/TX000000DQmH/WRGwuYg2iMsKX6NAIK3MygCUOlg0SPQ..YvGWrwfNeM","source":"cve@mitre.org"},{"url":"https://support.ixon.cloud/s/article/VPN-Client-installation-and-uninstallation","source":"cve@mitre.org"}]}}]}