CVE-2026-34178
CRITICALImporting a crafted backup leads to project restriction bypass
Title source: cnaDescription
In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing all project restriction enforcement and allowing full host compromise.
Scores
CVSS v3
9.1
EPSS
0.0005
EPSS Percentile
14.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-20
Status
published
Products (5)
canonical/lxd
0.0.0-20210305023314-538ac3df036eGo
canonical/lxd
4.12 - 5.0.6
Canonical/lxd
4.12.0 - 5.0.7
Canonical/lxd
5.1.0 - 5.21.5
Canonical/lxd
6.0.0 - 6.8.0
Published
Apr 09, 2026
Tracked Since
Apr 09, 2026