In Pritunl Client before 1.3.4220.57, an administrator with access to /Applications can escalate privileges after uninstalling the product. Specifically, an administrator can insert a new file at the pathname of the removed pritunl-service file. This file then is executed by a LaunchDaemon as root.
CVE ID: CVE-2025-43917
CVSS Base Severity: HIGH
CVSS Base Score: 8.2
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Vendor: Pritunl
Product: Pritunl-Client
EPSS Score: 0.02% (probability of being exploited)
EPSS Percentile: 1.74% (scored less or equal to compared to others)
EPSS Date: 2025-05-08 (when was this score calculated)