Critical Vulnerability in WD Discovery Desktop App Allows Arbitrary Code Execution
A significant security flaw has been identified in Western Digital’s WD Discovery desktop application for Windows, potentially enabling attackers to execute arbitrary code on affected systems. This vulnerability, designated as CVE-2025-30248, impacts WD Discovery version 5.2.730 and all earlier versions.
Understanding the Vulnerability
The core of this security issue lies in a DLL hijacking vulnerability within the WD Discovery installer. DLL hijacking exploits the method by which Windows searches for dynamic-link library (DLL) files during application loading. An attacker with local access can place a malicious DLL file in the installer’s search path. When the legitimate application loads, it inadvertently executes the malicious DLL, granting the attacker the ability to run arbitrary code on the system.
In addition to the primary DLL search order hijacking vulnerability, Western Digital has identified further EXE and DLL hijacking issues within the Tiny Installer component used by WD Discovery. These multiple attack vectors significantly increase the security risk for users operating vulnerable versions of the software.
Potential Impact
While exploiting this vulnerability requires local access, the potential consequences are severe. Successful exploitation allows attackers to execute arbitrary code with the same privileges as the WD Discovery installer, potentially compromising the entire system. This issue is particularly concerning for organizations where multiple users share workstations or where physical security controls may be less stringent.
Western Digital has assessed the vulnerability with a Common Vulnerability Scoring System (CVSS) 4.0 score of 8.9, categorizing it as a high-severity threat.
Mitigation Measures
To address these vulnerabilities, Western Digital released WD Discovery version 5.3 on December 19, 2025. This update fully resolves all identified issues. Users will receive automatic update notifications through the application, prompting them to install the security patch. Alternatively, users can manually download version 5.3 from the official WD Discovery Downloads page.
Western Digital has acknowledged the contributions of Kazuma Matsumoto, a security researcher at GMO Cybersecurity by IERAE, Inc., and David Silva for responsibly disclosing these vulnerabilities through coordinated disclosure processes.
Recommendations for Users
Windows users running any version of WD Discovery prior to 5.3 are strongly advised to update their installations immediately to mitigate potential exploitation risks. Ensuring that software is up-to-date is a critical step in maintaining system security and protecting against known vulnerabilities.
Broader Context
This incident underscores the importance of vigilance in software security, particularly concerning applications that interact closely with system components. DLL hijacking is a well-known attack vector that can lead to significant security breaches if not properly mitigated.
Organizations should implement robust security practices, including regular software updates, user education on security best practices, and stringent access controls to minimize the risk of such vulnerabilities being exploited.
Conclusion
The discovery of this vulnerability in WD Discovery highlights the ongoing challenges in software security and the necessity for prompt action when such issues are identified. By updating to the latest version of the software, users can protect their systems from potential exploitation and contribute to a more secure computing environment.