CVE-2020-15258

Public Exploit
Insecure use of shell.openExternal in Wire

Description

In Wire before 3.20.x, `shell.openExternal` was used without checking the URL. This vulnerability allows an attacker to execute code on the victims machine by sending messages containing links with arbitrary protocols. The victim has to interact with the link and sees the URL that is opened. The issue was patched by implementing a helper function which checks if the URL's protocol is common. If it is common, the URL will be opened externally. If not, the URL will not be opened and a warning appears for the user informing them that a probably insecure URL was blocked from being executed. The issue is patched in Wire 3.20.x. More technical details about exploitation are available in the linked advisory.

Category

8.0
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.56%
Third-Party Advisory benjamin-altpeter.de Third-Party Advisory github.com Third-Party Advisory github.com
Affected: wireapp wire-desktop
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-15258?
CVE-2020-15258 has been scored as a high severity vulnerability.
How to fix CVE-2020-15258?
To fix CVE-2020-15258, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2020-15258 being actively exploited in the wild?
It is possible that CVE-2020-15258 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-15258?
CVE-2020-15258 affects wireapp wire-desktop.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.