Github.Com Canonical Lxd vulnerabilities
12 known vulnerabilities affecting github.com/canonical_lxd.
Total CVEs
12
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH3MEDIUM4LOW2
Vulnerabilities
Page 1 of 1
CVE-2026-34177CRITICAL≥ 0.0.0-20210305023314-538ac3df036e, ≤ 0.0.0-20260226085519-736f34afb2672026-04-10
CVE-2026-34177 [CRITICAL] CWE-184 LXD: VM lowlevel restriction bypass via raw.apparmor and raw.qemu.conf
LXD: VM lowlevel restriction bypass via raw.apparmor and raw.qemu.conf
## Summary
The `isVMLowLevelOptionForbidden` function in `lxd/project/limits/permissions.go` is missing `raw.apparmor` and `raw.qemu.conf` from its hardcoded forbidden list. A user with `can_edit` permission on a VM instance in a restricted project can combine these two omissions to bridge the LXD unix socket into the gu
ghsa
CVE-2026-34178CRITICAL≥ 0.0.0-20210305023314-538ac3df036e, ≤ 0.0.0-20260226085519-736f34afb2672026-04-10
CVE-2026-34178 [CRITICAL] CWE-20 LXD: Importing a crafted backup leads to project restriction bypass
LXD: Importing a crafted backup leads to project restriction bypass
## Summary
LXD instance backup import validates project restrictions against `backup/index.yaml` embedded in the tar archive, but creates the actual instance from `backup/container/backup.yaml` extracted to the storage volume. Because these are separate, independently attacker-controlled files within the same tar archive, an at
ghsa
CVE-2026-34179CRITICAL≥ 0.0.0-20210305023314-538ac3df036e, ≤ 0.0.0-20260226085519-736f34afb2672026-04-10
CVE-2026-34179 [CRITICAL] CWE-915 LXD: Update of type field in restricted TLS certificate allows privilege escalation to cluster admin
LXD: Update of type field in restricted TLS certificate allows privilege escalation to cluster admin
### Summary
A restricted TLS certificate user can escalate to cluster admin by changing their certificate type from `client` to `server` via PUT/PATCH to `/1.0/certificates/{fingerprint}`. The non-admin guard and reset block in `doCertificateUpdate` fail to vali
ghsa
CVE-2026-3351MEDIUM≥ 0, < 0.0.0-20260224152359-d936c90d47cf2026-03-04
CVE-2026-3351 [MEDIUM] CWE-862 lxd's non-recursive certificate listing bypasses per-object authorization and leaks all fingerprints
lxd's non-recursive certificate listing bypasses per-object authorization and leaks all fingerprints
## Summary
The `GET /1.0/certificates` endpoint (non-recursive mode) returns URLs containing fingerprints for all certificates in the trust store, bypassing the per-object `can_view` authorization check that is correctly applied in the recursive path. Any authentica
ghsaosv
CVE-2025-54289HIGH≥ 4.0, < 5.21.4≥ 6.0, < 6.5+1 more2025-10-02
CVE-2025-54289 [HIGH] CWE-1385 Canonical LXD Vulnerable to Privilege Escalation via WebSocket Connection Hijacking in Operations API
Canonical LXD Vulnerable to Privilege Escalation via WebSocket Connection Hijacking in Operations API
### Impact
LXD's operations API includes secret values necessary for WebSocket connections when retrieving information about running operations. These secret values are used for authentication of WebSocket connections for terminal and console sessions.
Therefore,
ghsaosv
CVE-2025-54286HIGH≥ 5.0, < 5.0.5≥ 5.1, < 5.21.4+2 more2025-10-02
CVE-2025-54286 [HIGH] CWE-352 Canonical LXD CSRF Vulnerability When Using Client Certificate Authentication with the LXD-UI
Canonical LXD CSRF Vulnerability When Using Client Certificate Authentication with the LXD-UI
### Description
OIDC authentication uses cookies with the SameSite=Strict attribute, preventing cookies from being sent with requests from other sites. Therefore, CSRF does not occur as long as web services in a Same Site relationship (same eTLD+1) with the origin running LXD-UI a
ghsaosv
CVE-2025-54293HIGH≥ 4.0, < 5.21.4≥ 6.0, < 6.5+1 more2025-10-02
CVE-2025-54293 [HIGH] CWE-22 Canonical LXD Path Traversal Vulnerability in Instance Log File Retrieval Function
Canonical LXD Path Traversal Vulnerability in Instance Log File Retrieval Function
### Impact
Although outside the scope of this penetration test, a path traversal vulnerability exists in the validLogFileName function that validates log file names in lxd/instance_logs.go in the LXD 5.0 LTS series.
This vulnerability was fixed in PR #15022 in February 2025, and is fixed in at least LX
ghsaosv
CVE-2025-54291MEDIUM≥ 4.0, < 5.21.4≥ 6.0, < 6.5+1 more2025-10-02
CVE-2025-54291 [MEDIUM] CWE-209 Canonical LXD Project Existence Determination Through Error Handling in Image Get Function
Canonical LXD Project Existence Determination Through Error Handling in Image Get Function
### Impact
The LXD /1.0/images endpoint is implemented as an AllowUntrusted API that requires no authentication, making it accessible to users without accounts. This API allows determining project existence through differences in HTTP status codes when accessed with the project parame
ghsaosv
CVE-2025-54288MEDIUM≥ 4.0, < 5.21.4≥ 6.0, < 6.5+1 more2025-10-02
CVE-2025-54288 [MEDIUM] CWE-290 Canonical LXD Source Container Identification Vulnerability via cmdline Spoofing in devLXD Server
Canonical LXD Source Container Identification Vulnerability via cmdline Spoofing in devLXD Server
### Impact
In LXD's devLXD server, the source container identification process uses process cmdline (command line) information, allowing attackers to impersonate other containers by spoofing process names.
The core issue lies in the findContainerForPID function in `lxd/
ghsaosv
CVE-2025-54290MEDIUM≥ 4.0, < 5.21.4≥ 6.0, < 6.5+1 more2025-10-02
CVE-2025-54290 [MEDIUM] CWE-200 Canonical LXD Project Existence Determination Through Error Handling in Image Export Function
Canonical LXD Project Existence Determination Through Error Handling in Image Export Function
### Impact
In LXD's images export API (`/1.0/images/{fingerprint}/export`), implementation differences in error handling allow determining project existence without authentication.
Specifically, in the following code, errors when multiple images match are directly returned to u
ghsaosv
CVE-2024-6156LOW≥ 0, < 0.0.0-20240708073652-5a492a3f00362024-12-09
CVE-2024-6156 [LOW] CWE-295 lxd CA certificate sign check bypass
lxd CA certificate sign check bypass
### Summary
If a `server.ca` file is present in `LXD_DIR` at LXD start up, LXD is in "PKI mode". In this mode, only TLS clients that have a CA-signed certificate should be able to authenticate with LXD.
We have discovered that if a client that sends a non-CA signed certificate during the TLS handshake, that client is able to authenticate with LXD if their certificate is present in the trust st
ghsaosv
CVE-2024-6219LOW≥ 0, < 0.0.0-20240403103450-0e7f2b5bf4d22024-12-09
CVE-2024-6219 [LOW] CWE-287 lxd has a restricted TLS certificate privilege escalation when in PKI mode
lxd has a restricted TLS certificate privilege escalation when in PKI mode
### Summary
If a `server.ca` file is present in `LXD_DIR` at LXD start up, LXD is in "PKI mode". In this mode, all clients must have certificates that have been signed by the CA.
The LXD configuration option `core.trust_ca_certificates` defaults to `false`. This means that although the client certificate has been signe
ghsaosv