Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0776: CWE-427: Uncontrolled Search Path Element in Discord Client

0
High
VulnerabilityCVE-2026-0776cvecve-2026-0776cwe-427
Published: Fri Jan 23 2026 (01/23/2026, 03:29:18 UTC)
Source: CVE Database V5
Vendor/Project: Discord
Product: Client

Description

CVE-2026-0776 is a high-severity local privilege escalation vulnerability in the Discord Client version 1. 0. 9196. It stems from an uncontrolled search path element in the discord_rpc module, allowing an attacker with limited code execution rights to escalate privileges by loading malicious files from unsecured locations. Exploitation requires the attacker to already have low-privileged code execution and involves tricking the client into loading a malicious file, resulting in arbitrary code execution with elevated privileges. No public exploits are known yet. The vulnerability impacts confidentiality, integrity, and availability of affected systems. European organizations using Discord Client 1. 0. 9196, especially in countries with high Discord adoption and strategic targets, should prioritize patching or mitigating this flaw.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:54:04 UTC

Technical Analysis

CVE-2026-0776 is a local privilege escalation vulnerability identified in the Discord Client, specifically version 1.0.9196. The root cause is an uncontrolled search path element vulnerability (CWE-427) within the discord_rpc module. This flaw allows the Discord Client to load a file from an insecure or attacker-controlled location. An attacker who has already gained the ability to execute code with low privileges on the target system can exploit this vulnerability to escalate their privileges by placing a malicious file in the search path. When the Discord Client loads this file, it executes arbitrary code with the privileges of the target user, potentially leading to full compromise of the user account and elevated system privileges. The vulnerability requires local access and some user interaction, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:R). The impact includes high confidentiality, integrity, and availability consequences, as attackers can execute arbitrary code and potentially control the system. No public exploits have been reported yet, but the vulnerability was assigned by the Zero Day Initiative (ZDI) and published on January 23, 2026. The lack of available patches at the time of disclosure increases the urgency for organizations to implement interim mitigations. The vulnerability is particularly concerning because Discord is widely used in both personal and professional contexts, including by European organizations for communication and collaboration.

Potential Impact

For European organizations, the impact of CVE-2026-0776 can be significant. Discord is commonly used for communication, collaboration, and community engagement, including within corporate, educational, and governmental environments. Successful exploitation allows attackers to escalate privileges locally, potentially leading to full system compromise, data theft, or disruption of services. Confidentiality is at risk as attackers can access sensitive communications and files. Integrity is compromised as attackers can execute arbitrary code and alter system or application behavior. Availability may also be affected if attackers disrupt Discord or related services. Given the widespread use of Discord in Europe, especially in countries with large tech sectors and critical infrastructure, this vulnerability could be leveraged in targeted attacks against high-value users or organizations. The requirement for local code execution limits remote exploitation but does not eliminate risk, especially in environments where users may run untrusted code or be subject to social engineering attacks. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation.

Mitigation Recommendations

To mitigate CVE-2026-0776, European organizations should take several specific steps beyond generic advice: 1) Restrict file system permissions to prevent unprivileged users from placing or modifying files in directories that the Discord Client searches for loading modules, particularly the discord_rpc module. 2) Monitor and audit file system changes in directories used by Discord to detect suspicious activity indicative of exploitation attempts. 3) Educate users to avoid running untrusted code or opening suspicious files that could enable initial low-privileged code execution. 4) Implement application whitelisting or sandboxing to limit the ability of malicious code to execute or escalate privileges. 5) Regularly update Discord Client software and apply vendor patches as soon as they become available, even though no patches were listed at disclosure. 6) Employ endpoint detection and response (EDR) solutions to detect anomalous behaviors related to privilege escalation or unauthorized module loading. 7) Consider network segmentation and least privilege principles to limit the impact of a compromised user account. These targeted mitigations help reduce the attack surface and limit the potential for exploitation until official patches are released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2026-01-08T22:50:50.092Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6972f3a64623b1157cfeb73b

Added to database: 1/23/2026, 4:05:58 AM

Last enriched: 1/30/2026, 9:54:04 AM

Last updated: 2/7/2026, 2:33:39 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats