Cyber Posture

CVE-2025-63946

HighPublic PoC

Published: 23 February 2026

Published
23 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 10.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-63946 is a high-severity Link Following (CWE-59) vulnerability in Tencent Pcmanager. Its CVSS base score is 7.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 10.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Direct local privilege escalation via race condition in Windows application, enabling arbitrary code execution with elevated rights.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A privilege escalation (PE) vulnerability in the Tencent PC Manager app thru 17.10.28554.205 on Windows devices enables a local user to execute programs with elevated privileges. However, execution requires that the local user is able to successfully exploit a race…

more

condition.

Deeper analysisAI

CVE-2025-63946 is a privilege escalation vulnerability (CWE-59) affecting the Tencent PC Manager application through version 17.10.28554.205 on Windows devices. The flaw enables a local user to execute arbitrary programs with elevated privileges by exploiting a race condition in the application.

The vulnerability can be exploited by a local attacker requiring no privileges (PR:N), though it has high attack complexity (AC:H) due to the need to successfully trigger the race condition. No user interaction is required (UI:N), and exploitation occurs with local attack vector (AV:L) and unchanged scope (S:U), resulting in high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The CVSS v3.1 base score is 7.4.

Proof-of-concept exploit code and details are available in GitHub repositories at https://github.com/alexlee820/CVE-2025-63946-Tencent-PC-Manager-EoP/blob/main/README.md and https://github.com/alexlee820/Tencent-PC-Manager-EoP.

Details

CWE(s)

Affected Products

tencent
pcmanager
≤ 17.10.28554.205

CVEs Like This One

CVE-2025-63945Same vendor: Tencent
CVE-2026-31979Shared CWE-59
CVE-2025-60710Shared CWE-59
CVE-2026-25906Shared CWE-59
CVE-2025-41667Shared CWE-59
CVE-2026-20610Shared CWE-59
CVE-2025-43257Shared CWE-59
CVE-2025-21322Shared CWE-59
CVE-2025-21331Shared CWE-59
CVE-2025-29795Shared CWE-59

References