CVE-2024-42029: n/a
xdg-desktop-portal-hyprland (aka an XDG Desktop Portal backend for Hyprland) before 1.3.3 allows OS command execution, e.g., because single quotes are not used when sending a list of app IDs and titles via the environment.
AI Analysis
Technical Summary
CVE-2024-42029 is a command injection vulnerability identified in xdg-desktop-portal-hyprland, a backend component for the XDG Desktop Portal tailored for the Hyprland Wayland compositor. The vulnerability exists because the software does not properly enclose app IDs and titles in single quotes when passing them as environment variables. This improper sanitization allows an attacker with local privileges to inject arbitrary OS commands, leading to command execution on the host system. The flaw is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). Exploitation does not require user interaction but does require at least low-level privileges (PR:L). The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and low impact on confidentiality, integrity, and availability. The vulnerability affects versions prior to 1.3.3, which has addressed the issue by properly quoting environment variables to prevent command injection. No public exploits or widespread attacks have been reported as of the publication date (July 27, 2024).
Potential Impact
The vulnerability allows an attacker with local access and some privileges to execute arbitrary OS commands, potentially leading to unauthorized system modifications, data leakage, or service disruption. Although the impact on confidentiality, integrity, and availability is rated low to medium, the ability to execute arbitrary commands can be leveraged for privilege escalation or lateral movement within a compromised environment. Organizations using Hyprland with the vulnerable xdg-desktop-portal backend risk local compromise of user sessions or escalation to higher privileges if combined with other vulnerabilities. This can affect desktop users, developers, or systems relying on Hyprland for graphical sessions, particularly in Linux environments where this compositor is deployed. The lack of known exploits reduces immediate risk, but the vulnerability remains a significant concern for security hygiene and system integrity.
Mitigation Recommendations
The primary mitigation is to upgrade xdg-desktop-portal-hyprland to version 1.3.3 or later, where the vulnerability is fixed by proper quoting of environment variables to prevent command injection. Until patching is possible, organizations should restrict local access to trusted users only and monitor for suspicious activity related to the portal backend. Employing application sandboxing or mandatory access controls (e.g., SELinux, AppArmor) can limit the impact of potential exploitation. Additionally, auditing environment variable handling in custom or third-party integrations with xdg-desktop-portal-hyprland can help identify and remediate similar injection risks. Regularly updating Linux desktop components and maintaining least privilege principles for user accounts will reduce exposure.
Affected Countries
United States, Germany, France, United Kingdom, Netherlands, Canada, Australia, Japan, South Korea, India
CVE-2024-42029: n/a
Description
xdg-desktop-portal-hyprland (aka an XDG Desktop Portal backend for Hyprland) before 1.3.3 allows OS command execution, e.g., because single quotes are not used when sending a list of app IDs and titles via the environment.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-42029 is a command injection vulnerability identified in xdg-desktop-portal-hyprland, a backend component for the XDG Desktop Portal tailored for the Hyprland Wayland compositor. The vulnerability exists because the software does not properly enclose app IDs and titles in single quotes when passing them as environment variables. This improper sanitization allows an attacker with local privileges to inject arbitrary OS commands, leading to command execution on the host system. The flaw is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). Exploitation does not require user interaction but does require at least low-level privileges (PR:L). The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and low impact on confidentiality, integrity, and availability. The vulnerability affects versions prior to 1.3.3, which has addressed the issue by properly quoting environment variables to prevent command injection. No public exploits or widespread attacks have been reported as of the publication date (July 27, 2024).
Potential Impact
The vulnerability allows an attacker with local access and some privileges to execute arbitrary OS commands, potentially leading to unauthorized system modifications, data leakage, or service disruption. Although the impact on confidentiality, integrity, and availability is rated low to medium, the ability to execute arbitrary commands can be leveraged for privilege escalation or lateral movement within a compromised environment. Organizations using Hyprland with the vulnerable xdg-desktop-portal backend risk local compromise of user sessions or escalation to higher privileges if combined with other vulnerabilities. This can affect desktop users, developers, or systems relying on Hyprland for graphical sessions, particularly in Linux environments where this compositor is deployed. The lack of known exploits reduces immediate risk, but the vulnerability remains a significant concern for security hygiene and system integrity.
Mitigation Recommendations
The primary mitigation is to upgrade xdg-desktop-portal-hyprland to version 1.3.3 or later, where the vulnerability is fixed by proper quoting of environment variables to prevent command injection. Until patching is possible, organizations should restrict local access to trusted users only and monitor for suspicious activity related to the portal backend. Employing application sandboxing or mandatory access controls (e.g., SELinux, AppArmor) can limit the impact of potential exploitation. Additionally, auditing environment variable handling in custom or third-party integrations with xdg-desktop-portal-hyprland can help identify and remediate similar injection risks. Regularly updating Linux desktop components and maintaining least privilege principles for user accounts will reduce exposure.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-07-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cc0b7ef31ef0b568bee
Added to database: 2/25/2026, 9:42:24 PM
Last enriched: 2/26/2026, 7:16:30 AM
Last updated: 4/12/2026, 3:42:36 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.