Untriaged
Permalink
CVE-2026-32107
8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
xrdp: Fail-open privilege drop in sesexec — child processes may execute as root if setuid fails
xrdp is an open source RDP server. In versions through 0.10.5, the session execution component did not properly handle an error during the privilege drop process. This improper privilege management could allow an authenticated local attacker to escalate privileges to root and execute arbitrary code on the system. An additional exploit would be needed to facilitate this. This issue has been fixed in version 0.10.6.
References
-
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-p5m6-7m43-pjv9 x_refsource_CONFIRM
-
https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6 x_refsource_MISC
Affected products
xrdp
- ==< 0.10.6
Matching in nixpkgs
pkgs.xrdp
Open source RDP server
Package maintainers
-
@lucasew Lucas Eduardo Wendt <lucas59356@gmail.com>
-
@chvp Charlotte Van Petegem <nixpkgs@cvpetegem.be>