CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “openvpn”

54 vulnerabilities found for “openvpn”

Page 1 of 3

CVE-2025-6776
HIGH7.3

A vulnerability classified as critical was found in xiaoyunjie openvpn-cms-flask up to 1.2.7. This vulnerability affects the function Upload of the file app/plugins/oss/app/controller.py of the component File Upload. The manipulation of the argument image leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.2.8 is able to address this issue. The name of the patch is e23559b98c8ea2957f09978c29f4e512ba789eb6. It is recommended to upgrade the affected component.

xiaoyunjie / openvpn-cms-flask
Network
Published Jun 27, 2025
Page 1 of 3
CVE-2025-6775
MEDIUM6.3

A vulnerability classified as critical has been found in xiaoyunjie openvpn-cms-flask up to 1.2.7. This affects the function create_user of the file /app/api/v1/openvpn.py of the component User Creation Endpoint. The manipulation of the argument Username leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.2.8 is able to address this issue. The patch is named e23559b98c8ea2957f09978c29f4e512ba789eb6. It is recommended to upgrade the affected component.

xiaoyunjie / openvpn-cms-flask
Network
Published Jun 27, 2025
CVE-2024-13454
MEDIUM5.3

Weak encryption algorithm in Easy-RSA version 3.0.5 through 3.1.7 allows a local attacker to more easily bruteforce the private CA key when created using OpenSSL 3

openvpn / easy-rsa
Local
Published Jan 20, 2025
CVE-2023-46850
CRITICAL9.8

Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.

openvpn / openvpn+4
Network
Published Nov 11, 2023
CVE-2023-46849
HIGH7.5

Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.

openvpn / openvpn+5
Network
Published Nov 11, 2023
CVE-2022-3761
MEDIUM5.9

OpenVPN Connect versions before 3.4.0.4506 (macOS) and OpenVPN Connect before 3.4.0.3100 (Windows) allows man-in-the-middle attackers to intercept configuration profile download requests which contains the users credentials

openvpn / connect+1
Network
Published Oct 17, 2023
CVE-2021-27406
HIGH8.8

An attacker can take leverage on PerFact OpenVPN-Client versions 1.4.1.0 and prior to send the config command from any application running on the local host machine to force the back-end server into initializing a new open-VPN instance with arbitrary open-VPN configuration. This could result in the attacker achieving execution with privileges of a SYSTEM user.

perfact / openvpn-client
Network
Published Oct 14, 2022
CVE-2021-4234
HIGH7.5

OpenVPN Access Server 2.10 and prior versions are susceptible to resending multiple packets in a response to a reset packet sent from the client which the client again does not respond to, resulting in a limited amplification attack.

openvpn / openvpn_access_server
Network
Published Jul 6, 2022
CVE-2022-33738
HIGH7.5

OpenVPN Access Server before 2.11 uses a weak random generator used to create user session token for the web portal

openvpn / openvpn_access_server
Network
Published Jul 6, 2022
CVE-2022-33737
HIGH7.5

The OpenVPN Access Server installer creates a log file readable for everyone, which from version 2.10.0 and before 2.11.0 may contain a random generated admin password

openvpn / openvpn_access_server
Network
Published Jul 6, 2022
CVE-2021-3824
MEDIUM6.1

OpenVPN Access Server 2.9.0 through 2.9.4 allow remote attackers to inject arbitrary web script or HTML via the web login page URL.

openvpn / openvpn_access_server
Network
Published Sep 23, 2021
CVE-2021-3613
HIGH7.8

OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe).

openvpn / connect
Local
Published Jul 2, 2021
CVE-2020-36382
HIGH7.5

OpenVPN Access Server 2.7.3 to 2.8.7 allows remote attackers to trigger an assert during the user authentication phase via incorrect authentication token data in an early phase of the user authentication resulting in a denial of service.

openvpn / openvpn_access_server
Network
Published Jun 4, 2021
CVE-2020-15077
MEDIUM5.3

OpenVPN Access Server 2.8.7 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.

openvpn / openvpn_access_server
Network
Published Jun 4, 2021
CVE-2020-27569
HIGH7.5

Arbitrary File Write exists in Aviatrix VPN Client 2.8.2 and earlier. The VPN service writes logs to a location that is world writable and can be leveraged to gain write access to any file on the system.

aviatrix / openvpn
Network
Published Apr 21, 2021
CVE-2020-15075
HIGH7.1

OpenVPN Connect installer for macOS version 3.2.6 and older may corrupt system critical files it should not have access via symlinks in /tmp.

openvpn / connect
Local
Published Mar 30, 2021
CVE-2020-15074
HIGH7.5

OpenVPN Access Server older than version 2.8.4 and version 2.9.5 generates new user authentication tokens instead of reusing exiting tokens on reconnect making it possible to circumvent the initial token expiry timestamp.

openvpn / openvpn_access_server+1
Network
Published Jul 14, 2020
CVE-2020-11462
HIGH7.5

An issue was discovered in OpenVPN Access Server before 2.7.0 and 2.8.x before 2.8.3. With the full featured RPC2 interface enabled, it is possible to achieve a temporary DoS state of the management interface when sending an XML Entity Expansion (XEE) payload to the XMLRPC based RPC2 interface. The duration of the DoS state depends on available memory and CPU speed. The default restricted mode of the RPC2 interface is NOT vulnerable.

openvpn / openvpn_access_server+1
Network
Published May 4, 2020
CVE-2020-7224
CRITICAL9.8

The Aviatrix OpenVPN client through 2.5.7 on Linux, macOS, and Windows is vulnerable when OpenSSL parameters are altered from the issued value set; the parameters could allow unauthorized third-party libraries to load.

aviatrix / openvpn
Network
Published Apr 16, 2020
CVE-2020-8953
CRITICAL9.8

OpenVPN Access Server 2.8.x before 2.8.1 allows LDAP authentication bypass (except when a user is enrolled in two-factor authentication).

openvpn / openvpn_access_server
Network
Published Feb 13, 2020