CVE-2026-34178

CRITICAL

Importing a crafted backup leads to project restriction bypass

Title source: cna
STIX 2.1

Description

In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing all project restriction enforcement and allowing full host compromise.

Scores

CVSS v3 9.1
EPSS 0.0005
EPSS Percentile 14.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-20
Status published
Products (5)
canonical/lxd 0.0.0-20210305023314-538ac3df036eGo
canonical/lxd 4.12 - 5.0.6
Canonical/lxd 4.12.0 - 5.0.7
Canonical/lxd 5.1.0 - 5.21.5
Canonical/lxd 6.0.0 - 6.8.0
Published Apr 09, 2026
Tracked Since Apr 09, 2026