CVE-2024-42029: n/a
CVE-2024-42029 is a command injection vulnerability in xdg-desktop-portal-hyprland before version 1. 3. 3. The flaw arises because the application fails to properly quote app IDs and titles when passing them via environment variables, enabling OS command execution. Exploitation requires local privileges and no user interaction, with an attacker able to execute arbitrary commands on the system. The vulnerability has a CVSS score of 6. 3, indicating medium severity, impacting confidentiality, integrity, and availability. No known exploits are currently reported in the wild. This affects Linux desktop environments using Hyprland with the vulnerable portal backend. Mitigation involves upgrading to version 1.
AI Analysis
Technical Summary
CVE-2024-42029 is a command injection vulnerability identified in xdg-desktop-portal-hyprland, a backend component for the XDG Desktop Portal tailored for the Hyprland Wayland compositor. The vulnerability exists because the software does not properly enclose app IDs and titles in single quotes when passing them as environment variables. This improper sanitization allows an attacker with local privileges to inject arbitrary OS commands, leading to command execution on the host system. The flaw is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). Exploitation does not require user interaction but does require at least low-level privileges (PR:L). The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and low impact on confidentiality, integrity, and availability. The vulnerability affects versions prior to 1.3.3, which has addressed the issue by properly quoting environment variables to prevent command injection. No public exploits or widespread attacks have been reported as of the publication date (July 27, 2024).
Potential Impact
The vulnerability allows an attacker with local access and some privileges to execute arbitrary OS commands, potentially leading to unauthorized system modifications, data leakage, or service disruption. Although the impact on confidentiality, integrity, and availability is rated low to medium, the ability to execute arbitrary commands can be leveraged for privilege escalation or lateral movement within a compromised environment. Organizations using Hyprland with the vulnerable xdg-desktop-portal backend risk local compromise of user sessions or escalation to higher privileges if combined with other vulnerabilities. This can affect desktop users, developers, or systems relying on Hyprland for graphical sessions, particularly in Linux environments where this compositor is deployed. The lack of known exploits reduces immediate risk, but the vulnerability remains a significant concern for security hygiene and system integrity.
Mitigation Recommendations
The primary mitigation is to upgrade xdg-desktop-portal-hyprland to version 1.3.3 or later, where the vulnerability is fixed by proper quoting of environment variables to prevent command injection. Until patching is possible, organizations should restrict local access to trusted users only and monitor for suspicious activity related to the portal backend. Employing application sandboxing or mandatory access controls (e.g., SELinux, AppArmor) can limit the impact of potential exploitation. Additionally, auditing environment variable handling in custom or third-party integrations with xdg-desktop-portal-hyprland can help identify and remediate similar injection risks. Regularly updating Linux desktop components and maintaining least privilege principles for user accounts will reduce exposure.
Affected Countries
United States, Germany, France, United Kingdom, Netherlands, Canada, Australia, Japan, South Korea, India
CVE-2024-42029: n/a
Description
CVE-2024-42029 is a command injection vulnerability in xdg-desktop-portal-hyprland before version 1. 3. 3. The flaw arises because the application fails to properly quote app IDs and titles when passing them via environment variables, enabling OS command execution. Exploitation requires local privileges and no user interaction, with an attacker able to execute arbitrary commands on the system. The vulnerability has a CVSS score of 6. 3, indicating medium severity, impacting confidentiality, integrity, and availability. No known exploits are currently reported in the wild. This affects Linux desktop environments using Hyprland with the vulnerable portal backend. Mitigation involves upgrading to version 1.
AI-Powered Analysis
Technical Analysis
CVE-2024-42029 is a command injection vulnerability identified in xdg-desktop-portal-hyprland, a backend component for the XDG Desktop Portal tailored for the Hyprland Wayland compositor. The vulnerability exists because the software does not properly enclose app IDs and titles in single quotes when passing them as environment variables. This improper sanitization allows an attacker with local privileges to inject arbitrary OS commands, leading to command execution on the host system. The flaw is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). Exploitation does not require user interaction but does require at least low-level privileges (PR:L). The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and low impact on confidentiality, integrity, and availability. The vulnerability affects versions prior to 1.3.3, which has addressed the issue by properly quoting environment variables to prevent command injection. No public exploits or widespread attacks have been reported as of the publication date (July 27, 2024).
Potential Impact
The vulnerability allows an attacker with local access and some privileges to execute arbitrary OS commands, potentially leading to unauthorized system modifications, data leakage, or service disruption. Although the impact on confidentiality, integrity, and availability is rated low to medium, the ability to execute arbitrary commands can be leveraged for privilege escalation or lateral movement within a compromised environment. Organizations using Hyprland with the vulnerable xdg-desktop-portal backend risk local compromise of user sessions or escalation to higher privileges if combined with other vulnerabilities. This can affect desktop users, developers, or systems relying on Hyprland for graphical sessions, particularly in Linux environments where this compositor is deployed. The lack of known exploits reduces immediate risk, but the vulnerability remains a significant concern for security hygiene and system integrity.
Mitigation Recommendations
The primary mitigation is to upgrade xdg-desktop-portal-hyprland to version 1.3.3 or later, where the vulnerability is fixed by proper quoting of environment variables to prevent command injection. Until patching is possible, organizations should restrict local access to trusted users only and monitor for suspicious activity related to the portal backend. Employing application sandboxing or mandatory access controls (e.g., SELinux, AppArmor) can limit the impact of potential exploitation. Additionally, auditing environment variable handling in custom or third-party integrations with xdg-desktop-portal-hyprland can help identify and remediate similar injection risks. Regularly updating Linux desktop components and maintaining least privilege principles for user accounts will reduce exposure.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-07-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cc0b7ef31ef0b568bee
Added to database: 2/25/2026, 9:42:24 PM
Last enriched: 2/26/2026, 7:16:30 AM
Last updated: 2/26/2026, 8:03:20 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.