Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23954: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in lxc incus

0
High
VulnerabilityCVE-2026-23954cvecve-2026-23954cwe-22
Published: Thu Jan 22 2026 (01/22/2026, 21:45:55 UTC)
Source: CVE Database V5
Vendor/Project: lxc
Product: incus

Description

Incus is a system container and virtual machine manager. Versions 6.21.0 and below allow a user with the ability to launch a container with a custom image (e.g a member of the ‘incus’ group) to use directory traversal or symbolic links in the templating functionality to achieve host arbitrary file read, and host arbitrary file write. This ultimately results in arbitrary command execution on the host. When using an image with a metadata.yaml containing templates, both the source and target paths are not checked for symbolic links or directory traversal. This can also be exploited in IncusOS. A fix is planned for versions 6.0.6 and 6.21.0, but they have not been released at the time of publication.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:40:59 UTC

Technical Analysis

CVE-2026-23954 is a path traversal vulnerability (CWE-22) found in Incus, a system container and virtual machine manager widely used for lightweight virtualization. The flaw exists in versions 6.21.0 and below, including versions from 6.0.0 up to 6.20.0 and earlier versions up to 6.0.5. The vulnerability specifically affects the templating functionality used during container launch when a custom image is provided. Incus allows users with the ability to launch containers (typically members of the 'incus' group) to supply images containing a metadata.yaml file with template definitions. These templates specify source and target file paths that are not properly sanitized or validated for directory traversal sequences or symbolic links. As a result, an attacker can craft templates that cause the system to read or write arbitrary files on the host filesystem outside the intended restricted directories. This arbitrary file read/write capability can be escalated to arbitrary command execution on the host, compromising the host system's confidentiality and integrity. The vulnerability does not require user interaction but does require limited privileges (ability to launch containers). The scope is significant because it affects the host system underlying the container environment, potentially impacting all containers and services running on it. At the time of disclosure, no patches have been released, but fixes are planned for versions 6.0.6 and 6.21.0. No known exploits have been observed in the wild yet, but the vulnerability's nature and impact make it a critical concern for environments relying on Incus for container or VM management.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of containerized and virtualized environments managed by Incus. Successful exploitation could lead to unauthorized access to sensitive host files, modification of critical system configurations, and execution of arbitrary commands with host-level privileges. This could result in data breaches, service disruption, and lateral movement within enterprise networks. Organizations in sectors with high container adoption such as finance, telecommunications, and government are particularly at risk. The ability to escalate from container-level privileges to host compromise undermines the isolation guarantees of containerization, potentially affecting multi-tenant environments and cloud service providers operating in Europe. Given the planned fixes are not yet available, the window of exposure remains open, increasing the urgency for mitigation. Additionally, the vulnerability could be leveraged in targeted attacks or ransomware campaigns, especially in countries with strategic infrastructure or critical services relying on Incus.

Mitigation Recommendations

European organizations should immediately audit their use of Incus and identify systems running affected versions (<=6.21.0 and <=6.0.5). Until patches are released, restrict membership of the 'incus' group to trusted administrators only, minimizing the number of users able to launch containers with custom images. Implement strict controls and monitoring on container image sources, disallowing untrusted or user-supplied images. Employ file integrity monitoring on host systems to detect unauthorized file modifications. Consider isolating Incus hosts in segmented network zones with limited access to critical infrastructure. Use container runtime security tools to monitor for suspicious template usage or unexpected file system operations. Prepare to deploy patches promptly once available and test updates in controlled environments before production rollout. Additionally, review and harden host OS security configurations to limit the impact of potential arbitrary command execution. Engage in threat hunting to detect any early exploitation attempts and maintain up-to-date incident response plans tailored to container escape scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T14:49:06.312Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69729f444623b1157c9270d5

Added to database: 1/22/2026, 10:05:56 PM

Last enriched: 1/30/2026, 9:40:59 AM

Last updated: 2/7/2026, 6:11:11 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats