CVE-2026-34178

Severity
9.1CRITICAL
EPSS
0.0%
top 86.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9
Latest updateApr 10

Description

In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directi

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 2.3 | Impact: 6.0

Affected Packages2 packages

CVEListV5canonical/lxd4.12.05.0.7+2
Gogithub.com/canonical/lxd0.0.0-20210305023314-538ac3df036e0.0.0-20260226085519-736f34afb267

🔴Vulnerability Details

2
GHSA
LXD: Importing a crafted backup leads to project restriction bypass2026-04-10
CVEList
Importing a crafted backup leads to project restriction bypass2026-04-09
CVE-2026-34178 (CRITICAL CVSS 9.1) | In Canonical LXD before 6.8 | cvebase.io