What is the Host Process for Windows Tasks (taskhostw.exe)?
The Host Process for Windows Tasks (taskhostw.exe, formerly taskhost.exe) is a core Windows system process that hosts scheduled tasks running as DLL-based components rather than standalone executables. It runs under the NT AUTHORITY\SYSTEM account (or other high-privilege accounts) to execute built-in Windows maintenance tasks, operating system services, and user-scheduled jobs. Because taskhostw.exe operates with elevated privileges and interacts with the filesystem on behalf of the system, any vulnerability in its path resolution logic can be abused by a low-privilege attacker to gain SYSTEM-level access.
Overview
CVE-2025-60710 is a link following vulnerability (CWE-59) in the Windows Host Process for Tasks. A local attacker with a standard user account can create a malicious symbolic link or NTFS reparse point that causes taskhostw.exe to perform privileged file operations — such as writes, renames, or permission changes — on attacker-chosen targets rather than intended system paths. This results in full privilege escalation to SYSTEM.
Affected Versions
| Platform | Affected |
|---|---|
| Windows 11 Version 24H2 | Yes |
| Windows 11 Version 25H2 | Yes |
| Windows Server 2025 | Yes |
| Windows Server 2025 (Server Core) | Yes |
Older Windows versions are not listed in this advisory — it appears the vulnerability was introduced or exposed in newer builds.
Technical Details
Root cause: Improper Link Resolution Before File Access (CWE-59)
Link-following vulnerabilities occur when a privileged process resolves a filesystem path and follows symbolic links or NTFS reparse points without sufficient validation of the final resolved path. In CVE-2025-60710, the Host Process for Windows Tasks opens or writes to a filesystem location that an unprivileged attacker can redirect via a symlink or reparse point to an arbitrary target.
Exploit chain:
- Set up symlink: Attacker (low-privilege user) creates a directory junction, symbolic link, or NTFS reparse point at a location that
taskhostw.exeis known to access during task execution - Task trigger: A scheduled task runs under SYSTEM via
taskhostw.exe; the process resolves a path that traverses the attacker's link - Privileged I/O on attacker target: Instead of writing to the intended system location,
taskhostw.exeperforms the privileged I/O (file write, ACL change, etc.) on the attacker's chosen target (e.g., a protected system binary or registry hive) - Privilege escalation: The attacker leverages the privileged write to modify a SYSTEM-owned file, replace a service binary, or alter a security descriptor — gaining persistent SYSTEM access
Attack characteristics:
- Authentication required: Local user account (any standard user, no admin rights)
- Complexity: Low — well-understood Windows symlink/reparse point techniques
- User interaction: None required — exploitation is triggered by a system task running on its own schedule
- Timing: The attacker places the link and waits for the next scheduled task execution cycle
Exploitation Context
Windows link-following and symlink LPE vulnerabilities are a well-established class that has been consistently exploited by ransomware and post-exploitation toolkits. The key operational advantage is that they require zero user interaction after initial code execution — an attacker who gains any foothold (via phishing, a web exploit, or credential theft) can reliably elevate to SYSTEM without any further social engineering.
With at least four public PoC exploits available on GitHub, the barrier to exploitation is extremely low. Any competent threat actor can operationalize this vulnerability with minimal development effort, making it particularly dangerous for organizations that have delayed the November 2025 Patch Tuesday updates.
Remediation
- Apply the November 2025 Patch Tuesday security update for Windows 11 24H2/25H2 and Windows Server 2025. Verify via
Settings → Windows Update → Update Historyfor updates dated November 11, 2025. - Prioritize Windows 11 24H2+ and Server 2025 systems — these are the confirmed affected versions.
- Limit local code execution opportunities — reduce the attack surface by applying principle of least privilege: use standard user accounts for day-to-day operations, restrict interactive logon on servers.
- Monitor for symlink/junction creation by non-administrative users in sensitive directories using endpoint detection or Sysmon Event ID 11 (FileCreate) and Event ID 23 (FileDelete) rules.
- Deploy Windows Defender Credential Guard and LSA Protection — limits the value of SYSTEM-level access post-escalation.
- Audit scheduled task configurations — ensure custom scheduled tasks on affected systems use appropriate service accounts with minimal required privileges.
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2025-60710 |
| Vendor / Product | Microsoft — Windows |
| NVD Published | 2025-11-11 |
| NVD Last Modified | 2026-04-13 |
| CVSS 3.1 Score | 7.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| Severity | HIGH |
| CWE | CWE-59 — Improper Link Resolution Before File Access (Link Following) |
| CISA KEV Added | 2026-04-13 |
| CISA KEV Deadline | 2026-04-27 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2025-11-11 | CVE-2025-60710 published and patched on November 2025 Patch Tuesday |
| 2025-11-11 | Patch released concurrently with advisory disclosure |
| 2025-11-01 | At least 4 public proof-of-concept exploits published on GitHub |
| 2026-04-13 | Added to CISA Known Exploited Vulnerabilities catalog; active exploitation confirmed |
| 2026-04-27 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2025-60710 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |
| Microsoft MSRC — CVE-2025-60710 | Vendor Advisory / Patch |
| Windows Forum — CVE-2025-60710 Analysis | Security Research |
| CWE-59 — Improper Link Resolution Before File Access | Weakness Classification |