Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-33430
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-26 Mar, 2026 | 17:16
Updated At-20 Apr, 2026 | 14:06

Briefcase is a tool for converting a Python project into a standalone native application. Starting in version 0.3.0 and prior to version 0.3.26, if a developer uses Briefcase to produce an Windows MSI installer for a project, and that project is installed for All Users (i.e., per-machine scope), the installation process creates an directory that inherits all the permissions of the parent directory. Depending on the location chosen by the installing user, this may allow a low privilege but authenticated user to replace or modify the binaries installed by the application. If an administrator then runs the altered binary, the binary will run with elevated privileges. The problem is caused by the template used to generate the WXS file for Windows projects. It was fixed in the templates used in Briefcase 0.3.26, 0.4.0, and 0.4.1. Re-running `briefcase create` on your Briefcase project will result in the updated templates being used. As a workaround, the patch can be added to any existing Briefcase .wxs file generated by Briefcase 0.3.24 or later.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.3HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CPE Matches

beeware
beeware
>>briefcase>>Versions from 0.3.0(inclusive) to 0.3.26(exclusive)
cpe:2.3:a:beeware:briefcase:*:*:*:*:*:python:*:*
Weaknesses
CWE IDTypeSource
CWE-732Primarysecurity-advisories@github.com
CWE ID: CWE-732
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/beeware/briefcase-windows-VisualStudio-template/pull/85security-advisories@github.com
Issue Tracking
Patch
https://github.com/beeware/briefcase-windows-app-template/pull/86security-advisories@github.com
Issue Tracking
Patch
https://github.com/beeware/briefcase/issues/2759security-advisories@github.com
Issue Tracking
https://github.com/beeware/briefcase/security/advisories/GHSA-r3r2-35v9-v238security-advisories@github.com
Mitigation
Patch
Vendor Advisory
Hyperlink: https://github.com/beeware/briefcase-windows-VisualStudio-template/pull/85
Source: security-advisories@github.com
Resource:
Issue Tracking
Patch
Hyperlink: https://github.com/beeware/briefcase-windows-app-template/pull/86
Source: security-advisories@github.com
Resource:
Issue Tracking
Patch
Hyperlink: https://github.com/beeware/briefcase/issues/2759
Source: security-advisories@github.com
Resource:
Issue Tracking
Hyperlink: https://github.com/beeware/briefcase/security/advisories/GHSA-r3r2-35v9-v238
Source: security-advisories@github.com
Resource:
Mitigation
Patch
Vendor Advisory
Change History
0Changes found

Details not found