CVE-2025-60710

Windows Host Process for Tasks (taskhostw.exe) — Symbolic Link Abuse Leading to SYSTEM Privilege Escalation
⚠️ CVSS 3.1  7.8 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

What is the Host Process for Windows Tasks (taskhostw.exe)?

The Host Process for Windows Tasks (taskhostw.exe, formerly taskhost.exe) is a core Windows system process that hosts scheduled tasks running as DLL-based components rather than standalone executables. It runs under the NT AUTHORITY\SYSTEM account (or other high-privilege accounts) to execute built-in Windows maintenance tasks, operating system services, and user-scheduled jobs. Because taskhostw.exe operates with elevated privileges and interacts with the filesystem on behalf of the system, any vulnerability in its path resolution logic can be abused by a low-privilege attacker to gain SYSTEM-level access.

Overview

Actively Exploited — Multiple Public PoCs Available. CVE-2025-60710 has at least four publicly available proof-of-concept exploits on GitHub as of April 2026. CISA's KEV listing confirms active in-the-wild exploitation. The combination of low exploitation complexity, no user interaction required, and widely available PoC code makes this a high-urgency patching priority.

CVE-2025-60710 is a link following vulnerability (CWE-59) in the Windows Host Process for Tasks. A local attacker with a standard user account can create a malicious symbolic link or NTFS reparse point that causes taskhostw.exe to perform privileged file operations — such as writes, renames, or permission changes — on attacker-chosen targets rather than intended system paths. This results in full privilege escalation to SYSTEM.

Affected Versions

Platform Affected
Windows 11 Version 24H2 Yes
Windows 11 Version 25H2 Yes
Windows Server 2025 Yes
Windows Server 2025 (Server Core) Yes

Older Windows versions are not listed in this advisory — it appears the vulnerability was introduced or exposed in newer builds.

Technical Details

Root cause: Improper Link Resolution Before File Access (CWE-59)

Link-following vulnerabilities occur when a privileged process resolves a filesystem path and follows symbolic links or NTFS reparse points without sufficient validation of the final resolved path. In CVE-2025-60710, the Host Process for Windows Tasks opens or writes to a filesystem location that an unprivileged attacker can redirect via a symlink or reparse point to an arbitrary target.

Exploit chain:

  1. Set up symlink: Attacker (low-privilege user) creates a directory junction, symbolic link, or NTFS reparse point at a location that taskhostw.exe is known to access during task execution
  2. Task trigger: A scheduled task runs under SYSTEM via taskhostw.exe; the process resolves a path that traverses the attacker's link
  3. Privileged I/O on attacker target: Instead of writing to the intended system location, taskhostw.exe performs the privileged I/O (file write, ACL change, etc.) on the attacker's chosen target (e.g., a protected system binary or registry hive)
  4. Privilege escalation: The attacker leverages the privileged write to modify a SYSTEM-owned file, replace a service binary, or alter a security descriptor — gaining persistent SYSTEM access

Attack characteristics:

  • Authentication required: Local user account (any standard user, no admin rights)
  • Complexity: Low — well-understood Windows symlink/reparse point techniques
  • User interaction: None required — exploitation is triggered by a system task running on its own schedule
  • Timing: The attacker places the link and waits for the next scheduled task execution cycle

Exploitation Context

Windows link-following and symlink LPE vulnerabilities are a well-established class that has been consistently exploited by ransomware and post-exploitation toolkits. The key operational advantage is that they require zero user interaction after initial code execution — an attacker who gains any foothold (via phishing, a web exploit, or credential theft) can reliably elevate to SYSTEM without any further social engineering.

With at least four public PoC exploits available on GitHub, the barrier to exploitation is extremely low. Any competent threat actor can operationalize this vulnerability with minimal development effort, making it particularly dangerous for organizations that have delayed the November 2025 Patch Tuesday updates.

Remediation

  1. Apply the November 2025 Patch Tuesday security update for Windows 11 24H2/25H2 and Windows Server 2025. Verify via Settings → Windows Update → Update History for updates dated November 11, 2025.
  2. Prioritize Windows 11 24H2+ and Server 2025 systems — these are the confirmed affected versions.
  3. Limit local code execution opportunities — reduce the attack surface by applying principle of least privilege: use standard user accounts for day-to-day operations, restrict interactive logon on servers.
  4. Monitor for symlink/junction creation by non-administrative users in sensitive directories using endpoint detection or Sysmon Event ID 11 (FileCreate) and Event ID 23 (FileDelete) rules.
  5. Deploy Windows Defender Credential Guard and LSA Protection — limits the value of SYSTEM-level access post-escalation.
  6. Audit scheduled task configurations — ensure custom scheduled tasks on affected systems use appropriate service accounts with minimal required privileges.

Key Details

PropertyValue
CVE ID CVE-2025-60710
Vendor / Product Microsoft — Windows
NVD Published2025-11-11
NVD Last Modified2026-04-13
CVSS 3.1 Score7.8
CVSS 3.1 VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
SeverityHIGH
CWE CWE-59 — Improper Link Resolution Before File Access (Link Following)
CISA KEV Added2026-04-13
CISA KEV Deadline2026-04-27
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2026-04-27. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2025-11-11CVE-2025-60710 published and patched on November 2025 Patch Tuesday
2025-11-11Patch released concurrently with advisory disclosure
2025-11-01At least 4 public proof-of-concept exploits published on GitHub
2026-04-13Added to CISA Known Exploited Vulnerabilities catalog; active exploitation confirmed
2026-04-27CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2025-60710 Vulnerability Database
CISA KEV Catalog Entry US Government
Microsoft MSRC — CVE-2025-60710 Vendor Advisory / Patch
Windows Forum — CVE-2025-60710 Analysis Security Research
CWE-59 — Improper Link Resolution Before File Access Weakness Classification