Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42029: n/a

0
Medium
VulnerabilityCVE-2024-42029cvecve-2024-42029
Published: Sat Jul 27 2024 (07/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-42029 is a command injection vulnerability in xdg-desktop-portal-hyprland before version 1. 3. 3. The flaw arises because the application fails to properly quote app IDs and titles when passing them via environment variables, enabling OS command execution. Exploitation requires local privileges and no user interaction, with an attacker able to execute arbitrary commands on the system. The vulnerability has a CVSS score of 6. 3, indicating medium severity, impacting confidentiality, integrity, and availability. No known exploits are currently reported in the wild. This affects Linux desktop environments using Hyprland with the vulnerable portal backend. Mitigation involves upgrading to version 1.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:16:30 UTC

Technical Analysis

CVE-2024-42029 is a command injection vulnerability identified in xdg-desktop-portal-hyprland, a backend component for the XDG Desktop Portal tailored for the Hyprland Wayland compositor. The vulnerability exists because the software does not properly enclose app IDs and titles in single quotes when passing them as environment variables. This improper sanitization allows an attacker with local privileges to inject arbitrary OS commands, leading to command execution on the host system. The flaw is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). Exploitation does not require user interaction but does require at least low-level privileges (PR:L). The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and low impact on confidentiality, integrity, and availability. The vulnerability affects versions prior to 1.3.3, which has addressed the issue by properly quoting environment variables to prevent command injection. No public exploits or widespread attacks have been reported as of the publication date (July 27, 2024).

Potential Impact

The vulnerability allows an attacker with local access and some privileges to execute arbitrary OS commands, potentially leading to unauthorized system modifications, data leakage, or service disruption. Although the impact on confidentiality, integrity, and availability is rated low to medium, the ability to execute arbitrary commands can be leveraged for privilege escalation or lateral movement within a compromised environment. Organizations using Hyprland with the vulnerable xdg-desktop-portal backend risk local compromise of user sessions or escalation to higher privileges if combined with other vulnerabilities. This can affect desktop users, developers, or systems relying on Hyprland for graphical sessions, particularly in Linux environments where this compositor is deployed. The lack of known exploits reduces immediate risk, but the vulnerability remains a significant concern for security hygiene and system integrity.

Mitigation Recommendations

The primary mitigation is to upgrade xdg-desktop-portal-hyprland to version 1.3.3 or later, where the vulnerability is fixed by proper quoting of environment variables to prevent command injection. Until patching is possible, organizations should restrict local access to trusted users only and monitor for suspicious activity related to the portal backend. Employing application sandboxing or mandatory access controls (e.g., SELinux, AppArmor) can limit the impact of potential exploitation. Additionally, auditing environment variable handling in custom or third-party integrations with xdg-desktop-portal-hyprland can help identify and remediate similar injection risks. Regularly updating Linux desktop components and maintaining least privilege principles for user accounts will reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cc0b7ef31ef0b568bee

Added to database: 2/25/2026, 9:42:24 PM

Last enriched: 2/26/2026, 7:16:30 AM

Last updated: 2/26/2026, 8:03:20 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats