Browse all 3 CVE security advisories affecting wixtoolset. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Wixtoolset is a development toolkit for creating Windows installers, primarily used by software developers to package applications. Historically, it has been associated with vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation or insecure default configurations. While no major public security incidents have been widely documented, the three recorded CVEs highlight potential risks in installer generation and deployment. Security researchers have noted that improper use of the tool could lead to insecure installation processes, though the core product remains generally safe when implemented with proper security controls and regular updates.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-29188 | Malicious directory junction can cause WiX RemoveFoldersEx to possibly delete elevated files — issuesCWE-59 | 7.8 | High | 2024-03-24 |
| CVE-2024-29187 | WiX based installers are vulnerable to binary hijack when run as SYSTEM — issuesCWE-732 | 7.3 | High | 2024-03-24 |
| CVE-2024-24810 | WiX is vulnerable to DLL redirection attacks that allow the attacker to escalate privileges — issuesCWE-426 | 8.3 | High | 2024-02-07 |
This page lists every published CVE security advisory associated with wixtoolset. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.