purevpn CVE Vulnerabilities & Metrics

Focus on purevpn vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About purevpn Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with purevpn. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total purevpn CVEs: 5
Earliest CVE date: 07 Feb 2018, 15:29 UTC
Latest CVE date: 25 Aug 2024, 17:15 UTC

Latest CVE reference: CVE-2023-48957

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical purevpn CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 6.08

Max CVSS: 10.0

Critical CVEs (≥9): 3

CVSS Range vs. Count

Range Count
0.0-3.9 2
4.0-6.9 0
7.0-8.9 0
9.0-10.0 3

CVSS Distribution Chart

Top 5 Highest CVSS purevpn CVEs

These are the five CVEs with the highest CVSS scores for purevpn, sorted by severity first and recency.

All CVEs for purevpn

CVE-2023-48957 purevpn vulnerability CVSS: 0 25 Aug 2024, 17:15 UTC

PureVPN Linux client 2.0.2-Productions fails to properly handle DNS queries, allowing them to bypass the VPN tunnel and be sent directly to the ISP or default DNS servers.

CVE-2018-18656 purevpn vulnerability CVSS: 2.1 26 Oct 2018, 12:29 UTC

The PureVPN client before 6.1.0 for Windows stores Login Credentials (username and password) in cleartext. The location of such files is %PROGRAMDATA%\purevpn\config\login.conf. Additionally, all local users can read this file.

CVE-2018-10204 purevpn vulnerability CVSS: 9.0 18 Apr 2018, 21:29 UTC

PureVPN 6.0.1 for Windows suffers from a SYSTEM privilege escalation vulnerability in its "sevpnclient" service. When configured to use the OpenVPN protocol, the "sevpnclient" service executes "openvpn.exe" using the OpenVPN config file located at %PROGRAMDATA%\purevpn\config\config.ovpn. This file allows "Write" permissions to users in the "Everyone" group. An authenticated attacker may modify this file to specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM account.

CVE-2018-7484 purevpn vulnerability CVSS: 9.3 26 Feb 2018, 02:29 UTC

An issue was discovered in PureVPN through 5.19.4.0 on Windows. The client installation grants the Everyone group Full Control permission to the installation directory. In addition, the PureVPNService.exe service, which runs under NT Authority\SYSTEM privileges, tries to load several dynamic-link libraries using relative paths instead of the absolute path. When not using a fully qualified path, the application will first try to load the library from the directory from which the application is started. As the residing directory of PureVPNService.exe is writable to all users, this makes the application susceptible to privilege escalation through DLL hijacking.

CVE-2018-6822 purevpn vulnerability CVSS: 10.0 07 Feb 2018, 15:29 UTC

In PureVPN 6.0.1 on macOS, HelperTool LaunchDaemon implements an unprotected XPC service that can be abused to execute system commands as root.