Company Details
expressvpn
233
14,566
541514
expressvpn.com
0
EXP_3580701
In-progress


ExpressVPN Company CyberSecurity Posture
expressvpn.comThe leading VPN company. Building a safer, better digital world.
Company Details
expressvpn
233
14,566
541514
expressvpn.com
0
EXP_3580701
In-progress
Between 750 and 799

ExpressVPN Global Score (TPRM)XXXX

Description: A critical security vulnerability in ExpressVPN Windows desktop application exposed users’ real IP addresses when using Remote Desktop Protocol (RDP) connections. The flaw, discovered through the company’s bug bounty program, affected specific versions of the Windows client and allowed TCP traffic over port 3389 to bypass the VPN tunnel. This potentially revealed users’ actual network locations to internet service providers and network observers. The vulnerability did not compromise the encryption of RDP sessions but created a significant privacy breach by allowing third parties to identify both the user’s connection to ExpressVPN and their access to specific remote servers. ExpressVPN patched the issue with version 12.101.0.45.


No incidents recorded for ExpressVPN in 2026.
No incidents recorded for ExpressVPN in 2026.
No incidents recorded for ExpressVPN in 2026.
ExpressVPN cyber incidents detection timeline including parent company and subsidiaries

The leading VPN company. Building a safer, better digital world.


## Our core business We manage linux / unix server infrastructures and build the efficient and secure networking environments using hardware cutting edge technologies suited to the needs of the project and the client. We believe in quality, opposed to quantity. Our company consists of highly

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas
.png)
Inside ExpressVPN's Bug Bounty Program: how independent researchers and our security team work together through YesWeHack to keep your...
Need a VPN for Ireland? Discover 5 top picks to access global content, stay private, and bypass geo-blocks with ease. Updated for 2026.
I need your help: Add Komando.com as a preferred source on Google. “Hi, Kim, I've heard you talk about VPNs.
Learn everything about the Log4Shell vulnerability, how it's exploited, which versions are affected, and how ExpressVPN helps you stay...
No matter how you subscribed, cancelling ExpressVPN is a straightforward process.
Tests showed ExpressVPN keeps download speeds high for fast streaming and torrenting, and latencies low for remote gaming -- though it's a...
EventVPN, a new freemium VPN built by the same team and on the same infrastructure as ExpressVPN, launched on September 18 for iOS and macOS...
ExpressVPN users are calling for a boycott after reports surfaced linking ownership to an Israel cybersecurity firm.
Our in-house cybersecurity experts and journalists, renowned for major reports like The Mother of All Breaches, conduct transparent,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ExpressVPN is https://www.expressvpn.com.
According to Rankiteo, ExpressVPN’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.
According to Rankiteo, ExpressVPN currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ExpressVPN has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, ExpressVPN is not certified under SOC 2 Type 1.
According to Rankiteo, ExpressVPN does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ExpressVPN is not listed as GDPR compliant.
According to Rankiteo, ExpressVPN does not currently maintain PCI DSS compliance.
According to Rankiteo, ExpressVPN is not compliant with HIPAA regulations.
According to Rankiteo,ExpressVPN is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ExpressVPN operates primarily in the Computer and Network Security industry.
ExpressVPN employs approximately 233 people worldwide.
ExpressVPN presently has no subsidiaries across any sectors.
ExpressVPN’s official LinkedIn profile has approximately 14,566 followers.
ExpressVPN is classified under the NAICS code 541514, which corresponds to Others.
No, ExpressVPN does not have a profile on Crunchbase.
Yes, ExpressVPN maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/expressvpn.
As of January 21, 2026, Rankiteo reports that ExpressVPN has experienced 1 cybersecurity incidents.
ExpressVPN has an estimated 3,288 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with comprehensive fix in version 12.101.0.45, remediation measures with enhanced internal safeguards, remediation measures with rigorous automated testing protocols..
Title: ExpressVPN Windows App RDP Leak Vulnerability
Description: A critical security vulnerability in ExpressVPN Windows desktop application that could expose users’ real IP addresses when using Remote Desktop Protocol (RDP) connections.
Type: Vulnerability
Attack Vector: Remote Desktop Protocol (RDP) connections
Vulnerability Exploited: Debug code in production builds causing routing failure
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Data Compromised: Real IP addresses
Systems Affected: ExpressVPN Windows application versions 12.97 through 12.101.0.2-beta
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Real IP addresses.

Entity Name: ExpressVPN
Entity Type: Company
Industry: Cybersecurity
Customers Affected: Enterprise RDP users

Remediation Measures: Comprehensive fix in version 12.101.0.45Enhanced internal safeguardsRigorous automated testing protocols

Type of Data Compromised: Real IP addresses
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Comprehensive fix in version 12.101.0.45, Enhanced internal safeguards, Rigorous automated testing protocols, .

Lessons Learned: Implement enhanced internal safeguards, Conduct rigorous automated testing protocols

Recommendations: Users should update to the latest version of the ExpressVPN Windows application
Key Lessons Learned: The key lessons learned from past incidents are Implement enhanced internal safeguards,Conduct rigorous automated testing protocols.

Source: ExpressVPN
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: ExpressVPN.

Root Causes: Debug code in production builds causing routing failure
Corrective Actions: Comprehensive Fix In Version 12.101.0.45, Enhanced Internal Safeguards, Rigorous Automated Testing Protocols,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Comprehensive Fix In Version 12.101.0.45, Enhanced Internal Safeguards, Rigorous Automated Testing Protocols, .
Most Significant Data Compromised: The most significant data compromised in an incident was Real IP addresses.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Real IP addresses.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Conduct rigorous automated testing protocols.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Users should update to the latest version of the ExpressVPN Windows application.
Most Recent Source: The most recent source of information about an incident is ExpressVPN.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.