
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
VMware Tools contains an insecure file handling vulnerability, identified as CVE-2025-22247, which was privately reported to VMware by Sergey Bliznyuk of Positive Technologies. The vulnerability affects VMware Tools versions 11.x.x and 12.x.x running on Windows and Linux operating systems, while macOS systems remain unaffected. The vulnerability was disclosed on May 12, 2025, and has been assigned a CVSS v3.1 base score of 6.1 (Moderate severity) (VMware Advisory).
The vulnerability exists in the file handling mechanisms of VMware Tools, specifically related to improper validation of file operations. The issue is classified under CWE-59 (Improper Link Resolution Before File Access). The vulnerability has a CVSS vector string of CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N, indicating local access requirement, low attack complexity, low privileges required, no user interaction needed, and potential for low confidentiality impact but high integrity impact (NVD, VMware Advisory).
The vulnerability allows non-administrative users to manipulate files within guest virtual machines to execute unauthorized file operations. This presents significant risk particularly in multi-user environments where VM guests may have multiple users with varying privilege levels. While the attack requires local access to the guest virtual machine, which limits the attack surface, it can lead to unauthorized file manipulation and potential privilege escalation within the VM (GBHackers).
VMware has released VMware Tools version 12.5.2 to address the vulnerability across affected platforms. For Windows 32-bit systems, the fix is included in VMware Tools 12.4.7, which is part of the 12.5.2 release package. Linux users will receive patches through their distribution vendors as updates to the open-vm-tools package. No workarounds are available for this vulnerability, making patching the only viable security option (VMware Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”