Oops, They Did It Again: ExpressVPN Fixes Another Privacy Leak!
ExpressVPN patched a flaw in its Windows client that exposed users’ real IP addresses by allowing RDP traffic to bypass the VPN tunnel. The bug, present in versions 12.97 to 12.101.0.2-beta, has been fixed in version 12.101.0.45. While encryption remained intact, ExpressVPN emphasized upgrading for full protection.

Hot Take:
ExpressVPN’s latest oopsie-daisy with RDP traffic is like ordering a cheeseburger without cheese. The cornerstone of a VPN is to mask your IP, and they let it slip like a greased-up penguin on an ice rink. But hey, they patched it up quicker than a toddler with a band-aid obsession. So, if you were using RDP thinking you were undercover, surprise! Your IP address was the star of the show. But don’t worry, ExpressVPN assures us that their encryption game is still strong; they’ve just got a few more checks to run before the next curtain call.
Key Points:
- ExpressVPN’s Windows client had a vulnerability causing RDP traffic to bypass the VPN tunnel.
- The flaw was due to leftover debug code from internal testing.
- Fix released with version 12.101.0.45 on June 18, 2025.
- Issue primarily affected users actively using RDP, considered low-risk by ExpressVPN.
- ExpressVPN will enhance its internal build checks to prevent future issues.