Open
Description
Microsoft PowerToys version
0.88.0
Installation method
GitHub
Area(s) with issue?
General
Steps to reproduce
plant a vulnerable DLL (i.e. TextShaping.dll) in the directory of PowerToys and run ZoomIt or TextExtractor. The DLL is overwritten and the modified code is executed.
https://www.foto-video-it.de/2025/allgemein/disclosure-dll-hijacking-in-microsoft-powertoys/
✔️ Expected Behavior
PowerToys must load the DLLs in every case from a secure location i.e. system32
❌ Actual Behavior
DLL-hijacking is possible
Additional Information
There is a potential fix for this but it must be reviewed: #39682
The vulnerability was already reported to the MSRC with Submission number VULN-146963 / Case number
94736 more than 90 days ago ...
Other Software
No response