HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

Local Privilege Escalation in NetBT e‑Fatura (CVE‑2025‑14018) Threatens Windows Server 2019 Deployments

A CWE‑428 unquoted search‑path flaw (CVE‑2025‑14018) in NetBT e‑Fatura enables any local user to run arbitrary code as SYSTEM on Windows Server 2019. The issue is critical for vendors running the invoicing platform, as it can lead to full domain compromise and downstream supply‑chain risk.

LiveThreat™ Intelligence · 📅 April 11, 2026· 📰 exploit-db.com
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
1 sector(s)
Actions
4 recommended
📰
Source
exploit-db.com

Local Privilege Escalation in NetBT e‑Fatura (CVE‑2025‑14018) Threatens Windows Server 2019 Deployments

What Happened — A CWE‑428 unquoted search‑path flaw (CVE‑2025‑14018) in NetBT e‑Fatura allows any local, non‑privileged Windows user to execute arbitrary code as SYSTEM. The vulnerability was publicly disclosed on Exploit‑DB (EDB‑ID 52509) with a working PoC that hijacks the InboxProcessor service binary path.

Why It Matters for TPRM

  • Attackers who gain a foothold on a compromised host can pivot to full domain control, jeopardizing all downstream third‑party services.
  • The flaw is exploitable without network access, making it a high‑impact risk for any vendor that runs the e‑Fatura web‑app on Windows Server 2019 or similar environments.
  • Unpatched instances can be leveraged for ransomware deployment, data exfiltration, or supply‑chain compromise affecting your own organization.

Who Is Affected — Financial services, accounting SaaS, and any enterprise that integrates NetBT e‑Fatura (ERP/Invoice processing) on Windows Server 2019 or later.

Recommended Actions

  • Verify whether the NetBT e‑Fatura component is in use across your vendor ecosystem.
  • Ensure the service binary path is quoted or relocate the executable to a directory without write permissions for non‑admin users.
  • Apply any vendor‑issued patches; if none exist, mitigate by restricting local logon rights and employing application‑whitelisting.

Technical Notes — The vulnerability stems from an unquoted service path (C:\inetpub\wwwroot\InboxProcessor\Netbt.Inbox.Process.exe). A low‑privilege user can place a malicious executable named C:\inetpub\wwwroot\InboxProcessor\Netbt.Inbox.Process.exe earlier in the search order, causing the Service Control Manager to launch the attacker‑controlled binary as LocalSystem. No CVE‑specific patch was listed at the time of disclosure. Source: Exploit‑DB 52509

📰 Original Source
https://www.exploit-db.com/exploits/52509

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.