Wire-Webapp, Local Data Deletion Vulnerability, CVE-2025-48066 (Medium)

Listen to this Post

How CVE-2025-48066 Works

The vulnerability in wire-webapp stems from a regression bug where the local database deletion function fails during user logout. When a user selects “This is a public computer” or requests data deletion, the client should purge local conversations and personal information. However, due to the flawed implementation, the data persists on disk. Attackers with physical access to the device could extract sensitive chat histories if encryption-at-rest isn’t enabled. The issue originates from improper cleanup routines in the logout workflow, where database transaction commits occur before deletion commands.

DailyCVE Form

Platform: Wire-Webapp
Version: <2025-05-14-production.0
Vulnerability: Persistent local data
Severity: Medium
Date: 2025-05-22

Prediction: Patch available (2025-05-14)

What Undercode Say:

Analytics:

  • Impact Score: 5.3 (Local attack vector)
  • Exploitability: Requires physical access
  • Affected Components: logout.js, `dbCleaner.js`

Exploit Commands:

sqlite3 ~/.wire/database.db "SELECT FROM messages" If encryption disabled
strings /var/lib/wire/localstore/.bin Binary data leakage

Protection Code:

// Manual cleanup workaround
const fs = require('fs');
fs.rmSync('/path/to/wire/data', { recursive: true, force: true });

Mitigation Steps:

1. Upgrade to wire-webapp ≥2025-05-14-production.0

2. Enable encryption-at-rest in config:

{
"encryption": {
"atRest": true,
"keyDerivationIterations": 100000
}
}

Detection Script:

import os
def check_wire_vulnerable():
return os.path.exists('/opt/Wire/bin/wire') and
open('/opt/Wire/version').read() < '2025-05-14'

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top