LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-33897

CVE-2026-33897 - Vulnerability Analysis

CriticalCVSS: 9.9

Last Updated: March 26, 2026

Incus - Path Traversal

Published: March 26, 2026Updated: March 26, 2026Remote Exploitable

Overview

Incus < 6.23.0 contains a file read/write vulnerability caused by pongo2 template chroot isolation bypass, letting attackers with instance access read/write files as root on the host, exploit requires instance template usage.

Severity & Score

Severity: Critical
CVSS Score: 9.9
EPSS Score: 4.7%(Probability of exploitation in next 30 days)

Impact

Attackers can read and write arbitrary files on the host as root, leading to full system compromise.

Mitigation

Update to version 6.23.0 or later.

Social Media Activity(1 post)

Stéphane Graber's website
Stéphane Graber's website
@blog
Mar 30, 2026

Announcing Incus 6.23 The Incus team is pleased to announce the release of Incus 6.23! This release is going to be our last 6.x release before Incus 7.0 LTS which is due out on April 30th. It’s also quite a busy release with a good mix of security issues (mostly thanks to an ongoing analysis by https://7asecurity.com), bug fixes and performance improvements and then a very good selection of features from expanding our OS support for VMs to adding more flexible instance storage with dependent volumes!https://stgraber.org/wp-content/uploads/2026/03/image-1-1024x530.png This fixes the following security issues:https://github.com/lxc/incus/security/advisories/GHSA-q9vp-3wcg-8p4x (low)https://github.com/lxc/incus/security/advisories/GHSA-p8mm-23gg-jc9r (moderate)https://github.com/lxc/incus/security/advisories/GHSA-vg76-xmhg-j5x3 (moderate)https://github.com/lxc/incus/security/advisories/GHSA-453r-g2pg-cxxq (high)https://github.com/lxc/incus/security/advisories/GHSA-83xr-5xxr-mh92 (critical)https://github.com/lxc/incus/security/advisories/GHSA-q4q8-7f2j-9h9f (critical) On the feature front, the highlights for this release are:Dependent storage volumesFreeBSD VM supportReworked CLI parserSupport for disabling DHCP announcement of the gatewaySupport for ipv4.dhcp.gateway on OVN networksSupport for io.bus on OVN NICsVM agent lifecycle eventsReworked incus file pull and incus storage volume file pullProject related metricsInstance low-level repair API The full announcement and changelog can be https://discuss.linuxcontainers.org/t/incus-6-23-has-been-released/26447. And for those who prefer videos, here’s the release https://www.youtube.com/watch?v=PGo03etJsMY: https://www.youtube.com/watch?v=PGo03etJsMY You can take the latest release of Incus up for a spin through our online demo service at: https://linuxcontainers.org/incus/try-it/ And as always, my company is offering commercial support on Incus, ranging from by-the-hour support contracts to one-off services on things like initial migration from LXD, review of your deployment to squeeze the most out of Incus or even feature sponsorship. You’ll find all details of that here: https://zabbly.com/incus Donations towards my work on this and other open source projects is also always appreciated, you can find me on https://github.com/sponsors/stgraber, https://patreon.com/stgraber and https://ko-fi.com/stgraber. Enjoy!

View original post

Details

CVE ID
CVE-2026-33897
Severity
Critical
CVSS Score
9.9
Type
path_traversal
Status
new
EPSS
4.7%
Social Posts
1

CWE

  • CWE-1336

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS Score

4.7%Probability of exploitation in the next 30 days