CVE-2026-33897 - Vulnerability Analysis
CriticalCVSS: 9.9Last Updated: March 26, 2026
Incus - Path Traversal
Overview
Incus < 6.23.0 contains a file read/write vulnerability caused by pongo2 template chroot isolation bypass, letting attackers with instance access read/write files as root on the host, exploit requires instance template usage.
Severity & Score
Impact
Attackers can read and write arbitrary files on the host as root, leading to full system compromise.
Mitigation
Update to version 6.23.0 or later.
Social Media Activity(1 post)
Announcing Incus 6.23 The Incus team is pleased to announce the release of Incus 6.23! This release is going to be our last 6.x release before Incus 7.0 LTS which is due out on April 30th. It’s also quite a busy release with a good mix of security issues (mostly thanks to an ongoing analysis by https://7asecurity.com), bug fixes and performance improvements and then a very good selection of features from expanding our OS support for VMs to adding more flexible instance storage with dependent volumes!https://stgraber.org/wp-content/uploads/2026/03/image-1-1024x530.png This fixes the following security issues:https://github.com/lxc/incus/security/advisories/GHSA-q9vp-3wcg-8p4x (low)https://github.com/lxc/incus/security/advisories/GHSA-p8mm-23gg-jc9r (moderate)https://github.com/lxc/incus/security/advisories/GHSA-vg76-xmhg-j5x3 (moderate)https://github.com/lxc/incus/security/advisories/GHSA-453r-g2pg-cxxq (high)https://github.com/lxc/incus/security/advisories/GHSA-83xr-5xxr-mh92 (critical)https://github.com/lxc/incus/security/advisories/GHSA-q4q8-7f2j-9h9f (critical) On the feature front, the highlights for this release are:Dependent storage volumesFreeBSD VM supportReworked CLI parserSupport for disabling DHCP announcement of the gatewaySupport for ipv4.dhcp.gateway on OVN networksSupport for io.bus on OVN NICsVM agent lifecycle eventsReworked incus file pull and incus storage volume file pullProject related metricsInstance low-level repair API The full announcement and changelog can be https://discuss.linuxcontainers.org/t/incus-6-23-has-been-released/26447. And for those who prefer videos, here’s the release https://www.youtube.com/watch?v=PGo03etJsMY: https://www.youtube.com/watch?v=PGo03etJsMY You can take the latest release of Incus up for a spin through our online demo service at: https://linuxcontainers.org/incus/try-it/ And as always, my company is offering commercial support on Incus, ranging from by-the-hour support contracts to one-off services on things like initial migration from LXD, review of your deployment to squeeze the most out of Incus or even feature sponsorship. You’ll find all details of that here: https://zabbly.com/incus Donations towards my work on this and other open source projects is also always appreciated, you can find me on https://github.com/sponsors/stgraber, https://patreon.com/stgraber and https://ko-fi.com/stgraber. Enjoy!
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33897
- Severity
- Critical
- CVSS Score
- 9.9
- Type
- path_traversal
- Status
- new
- EPSS
- 4.7%
- Social Posts
- 1
CWE
- CWE-1336
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H