CVE-2026-23953: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in lxc incus
Incus is a system container and virtual machine manager. In versions 6.20.0 and below, a user with the ability to launch a container with a custom YAML configuration (e.g a member of the ‘incus’ group) can create an environment variable containing newlines, which can be used to add additional configuration items in the container’s lxc.conf due to newline injection. This can allow adding arbitrary lifecycle hooks, ultimately resulting in arbitrary command execution on the host. Exploiting this issue on IncusOS requires a slight modification of the payload to change to a different writable directory for the validation step (e.g /tmp). This can be confirmed with a second container with /tmp mounted from the host (A privileged action for validation only). A fix is planned for versions 6.0.6 and 6.21.0, but they have not been released at the time of publication.
AI Analysis
Technical Summary
CVE-2026-23953 is a vulnerability classified under CWE-93 (Improper Neutralization of CRLF Sequences) affecting the Incus system container and virtual machine manager, specifically versions 6.20.0 and below, including versions up to 6.0.5. The flaw arises because a user with the ability to launch containers with custom YAML configurations—typically members of the 'incus' group—can inject newline characters into environment variables. This newline injection allows the attacker to append arbitrary configuration directives into the container's lxc.conf file. Since lxc.conf controls container lifecycle hooks, the attacker can add malicious hooks that execute arbitrary commands on the host system, effectively escalating privileges from a limited user to host-level command execution. On IncusOS, exploitation requires a slight payload modification to use a writable directory such as /tmp for validation, which involves launching a second container with /tmp mounted from the host, a privileged operation used only for validation. The vulnerability has a CVSS v3.1 score of 8.7 (high severity), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and a scope change (S:C) affecting confidentiality and integrity at a high level but not availability. No known exploits are reported in the wild at the time of publication. A patch is planned for versions 6.0.6 and 6.21.0 but has not yet been released. This vulnerability highlights the risks of improper input sanitization in container configuration management, especially when users have limited but non-root privileges.
Potential Impact
For European organizations, the impact of CVE-2026-23953 can be significant, especially for those relying on Incus for container or VM management in production or development environments. Successful exploitation leads to arbitrary command execution on the host, compromising the confidentiality and integrity of the host system and potentially the entire infrastructure. This could allow attackers to deploy malware, exfiltrate sensitive data, or pivot to other internal systems. Since the vulnerability requires membership in the 'incus' group, insider threats or compromised accounts with these privileges pose a direct risk. The lack of availability impact means systems remain operational but fully compromised. Organizations in sectors with strict data protection regulations (e.g., GDPR) face compliance risks if breaches occur. Additionally, the complexity of exploitation is low once privileges are obtained, increasing the threat level. The absence of known exploits in the wild currently provides a window for proactive mitigation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit and restrict membership of the 'incus' group to trusted administrators only, minimizing the number of users who can launch containers with custom YAML. 2) Monitor and log container creation activities, especially those involving custom configurations, to detect anomalous or unauthorized attempts. 3) Employ strict input validation and sanitization on environment variables and container configuration files where possible, even before official patches are available. 4) Use container runtime security tools to monitor lifecycle hook executions and detect unauthorized commands. 5) Isolate container hosts and limit access to them, reducing the risk of lateral movement if exploitation occurs. 6) Plan and prioritize patching to versions 6.0.6 or 6.21.0 once released, testing patches in staging environments to ensure compatibility. 7) Consider deploying compensating controls such as mandatory access controls (e.g., SELinux, AppArmor) to restrict the impact of arbitrary command execution. 8) Educate administrators about the risks of CRLF injection and the importance of secure container configuration management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
CVE-2026-23953: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in lxc incus
Description
Incus is a system container and virtual machine manager. In versions 6.20.0 and below, a user with the ability to launch a container with a custom YAML configuration (e.g a member of the ‘incus’ group) can create an environment variable containing newlines, which can be used to add additional configuration items in the container’s lxc.conf due to newline injection. This can allow adding arbitrary lifecycle hooks, ultimately resulting in arbitrary command execution on the host. Exploiting this issue on IncusOS requires a slight modification of the payload to change to a different writable directory for the validation step (e.g /tmp). This can be confirmed with a second container with /tmp mounted from the host (A privileged action for validation only). A fix is planned for versions 6.0.6 and 6.21.0, but they have not been released at the time of publication.
AI-Powered Analysis
Technical Analysis
CVE-2026-23953 is a vulnerability classified under CWE-93 (Improper Neutralization of CRLF Sequences) affecting the Incus system container and virtual machine manager, specifically versions 6.20.0 and below, including versions up to 6.0.5. The flaw arises because a user with the ability to launch containers with custom YAML configurations—typically members of the 'incus' group—can inject newline characters into environment variables. This newline injection allows the attacker to append arbitrary configuration directives into the container's lxc.conf file. Since lxc.conf controls container lifecycle hooks, the attacker can add malicious hooks that execute arbitrary commands on the host system, effectively escalating privileges from a limited user to host-level command execution. On IncusOS, exploitation requires a slight payload modification to use a writable directory such as /tmp for validation, which involves launching a second container with /tmp mounted from the host, a privileged operation used only for validation. The vulnerability has a CVSS v3.1 score of 8.7 (high severity), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and a scope change (S:C) affecting confidentiality and integrity at a high level but not availability. No known exploits are reported in the wild at the time of publication. A patch is planned for versions 6.0.6 and 6.21.0 but has not yet been released. This vulnerability highlights the risks of improper input sanitization in container configuration management, especially when users have limited but non-root privileges.
Potential Impact
For European organizations, the impact of CVE-2026-23953 can be significant, especially for those relying on Incus for container or VM management in production or development environments. Successful exploitation leads to arbitrary command execution on the host, compromising the confidentiality and integrity of the host system and potentially the entire infrastructure. This could allow attackers to deploy malware, exfiltrate sensitive data, or pivot to other internal systems. Since the vulnerability requires membership in the 'incus' group, insider threats or compromised accounts with these privileges pose a direct risk. The lack of availability impact means systems remain operational but fully compromised. Organizations in sectors with strict data protection regulations (e.g., GDPR) face compliance risks if breaches occur. Additionally, the complexity of exploitation is low once privileges are obtained, increasing the threat level. The absence of known exploits in the wild currently provides a window for proactive mitigation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit and restrict membership of the 'incus' group to trusted administrators only, minimizing the number of users who can launch containers with custom YAML. 2) Monitor and log container creation activities, especially those involving custom configurations, to detect anomalous or unauthorized attempts. 3) Employ strict input validation and sanitization on environment variables and container configuration files where possible, even before official patches are available. 4) Use container runtime security tools to monitor lifecycle hook executions and detect unauthorized commands. 5) Isolate container hosts and limit access to them, reducing the risk of lateral movement if exploitation occurs. 6) Plan and prioritize patching to versions 6.0.6 or 6.21.0 once released, testing patches in staging environments to ensure compatibility. 7) Consider deploying compensating controls such as mandatory access controls (e.g., SELinux, AppArmor) to restrict the impact of arbitrary command execution. 8) Educate administrators about the risks of CRLF injection and the importance of secure container configuration management.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-19T14:49:06.312Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69729bc34623b1157c91e03d
Added to database: 1/22/2026, 9:50:59 PM
Last enriched: 1/30/2026, 9:40:40 AM
Last updated: 2/7/2026, 3:42:10 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighCVE-2026-2085: Command Injection in D-Link DWR-M921
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.