Remote Command Injection in OpenVPN 2.7 on POSIX Platforms
CVE-2025-10680

8.8HIGH

Key Information:

Vendor

Openvpn

Status
Vendor
CVE Published:
24 October 2025

What is CVE-2025-10680?

CVE-2025-10680 is a significant vulnerability found in OpenVPN, a widely utilized open-source VPN solution that provides secure point-to-point or site-to-site connections in routed or bridged configurations. This vulnerability specifically affects versions 2.7_alpha1 through 2.7_beta1 on POSIX platforms. It enables a remote authenticated server to execute arbitrary shell commands on the client device through the manipulation of DNS variables when the --dns-updown option is employed. This compromise can have dire consequences for organizations, as it may allow attackers to gain unauthorized access to sensitive systems, manipulate data, or affect the functionality of the VPN service itself, ultimately jeopardizing the security and integrity of network communications.

Potential impact of CVE-2025-10680

  1. Remote Code Execution: The ability for an authenticated server to inject shell commands could allow attackers to execute arbitrary code on the affected systems. This could lead to unauthorized changes to system configurations, exfiltration of sensitive data, or deployment of further malicious payloads.

  2. Data Breach and Compromise: Exploiting this vulnerability could facilitate unauthorized access to protected data and resources, potentially leading to significant data breaches. Critical organizational information can be exposed or manipulated, resulting in loss of confidentiality and trust.

  3. Service Disruption: By executing commands on the client device, attackers may disrupt the normal functioning of the OpenVPN service. This can lead to downtime, affecting organizational operations and causing potential financial losses as well as reputational damage.

Affected Version(s)

OpenVPN BSD 2.7_alpha1 <= 2.7_beta1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.