
A vulnerability in Speedify VPN that could allow threat actors to escalate privileges and gain full control over the system has been found. Tracked as CVE-2025-25364 in Speedify’s privileged helper tool, it is a critical command injection vulnerability.
Version 15.0.0 of macOS is impacted by this Speedify VPN flaw that could potentially expose millions of the VPN users to hackers. It was discovered by SecureLayer7 and has been addressed by the service provider through the version 15.4.1.
The helper tool with elevated privileges performs system-level network operations within which the flaw was found in me.connectify.SMJobBlessHelper XPC service.
The helper tool has had a complete rewrite with the update addressing the vulnerability. The new version implements the required input validation and addresses the command injection vector to prevent vulnerability exploitation.
The improper input validation of the user-controlled fields of cmdPath and cmdBin within XPC messages could be exploited to inject arbitrary commands to be executed with root privileges giving them full control over unpatched macOS systems.
A report by Cyber Security News stated that attackers can construct and execute command string using asprintf, embedding the user-supplied cmdPath and cmdBin as:
If updates are not installed, it could allow attackers to read, and modify system data. They can also install malware and create backdoors for further exchange of data between servers and to evade detection.
Addressing the flaw, SecureLayer7 stated, “This flaw highlights the importance of rigorous input validation and secure coding practices, especially in privileged components.”