CWE-64: Windows Shortcut Following (.LNK)
low-riskThe product, when opening a file or directory, does not sufficiently handle when the file is a Windows shortcut (.LNK) whose target is outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.
Abstraction: Variant
Common Consequences
Confidentiality
→
Read Files or Directories
Real-World Examples (9)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2025-49385 | 7.8 | 0.2% | — |
| CVE-2025-49384 | 7.8 | 0.1% | — |
| CVE-2025-52837 | 7.8 | 0.1% | — |
| CVE-2025-48443 | 6.7 | 0.1% | — |
| CVE-2025-52521 | 7.8 | 0.1% | — |
| CVE-2021-41562 | 6.1 | 0.1% | — |
| CVE-2021-1492 | 6.6 | 0.1% | — |
| CVE-2025-53503 | 7.8 | 0.0% | — |
| CVE-2025-7376 | 5.9 | 0.0% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal