CVE-2025-62220: Windows Subsystem for Linux GUI Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 8.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Unlikely
Patch Tuesday
2025-Nov
Released
2025-11-11
Last Updated
2025-11-13
EPSS Score
0.05% (percentile: 16.2%)

Description

Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthorized attacker to execute code over a network.

FAQ

Where do I find installation steps for WSL and WSLg? If you have an existing WSL installation without WSLg and want to update to the latest version of WSL which includes WSLg, run the command wsl --update from an elevated command prompt. To learn more visit the GitHub Repo. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). How could an attacker exploit this vulnerability? A vulnerability in the Remote Desktop client can lead to remote code execution in the Windows host process (msrdc.exe). While the typical scenario involves local communication between a Windows host and a Linux VM, the attack vector is Network (AV:N) because it relies on a network protocol. Although user interaction is required, the risk extends beyond local use: the client supports loading plugins via the /plugin option, and the protocol is open source. This means a crafted attack could potentially be delivered remotely if an attacker can interact with the protocol.

Affected Products (1)

Open Source Software

  • Windows Subsystem for Linux GUI

Security Updates (1)

Acknowledgments

<a href="https://twitter.com/mas0nshi">YingQi Shi (@Mas0n)</a> with <a href="https://www.dbappsecurity.com.cn/product/cloud250.html">DBAPPSecurity WeBin Lab</a>

Revision History

  • 2025-11-11: Information published.
  • 2025-11-13: Corrected one or more links in the FAQ. This is an informational change only.