Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

lxd

Source -

CNAADPNVD

CNA CVEs -

5

ADP CVEs -

2

CISA CVEs -

0

NVD CVEs -

19
Related CVEsRelated VendorsRelated AssignersReports
20Vulnerabilities found

CVE-2026-34179
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-9.1||CRITICAL
EPSS-0.12% / 30.83%
||
7 Day CHG~0.00%
Published-09 Apr, 2026 | 09:22
Updated-22 Apr, 2026 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Update of type field in restricted TLS certificate allows privilege escalation to cluster admin

In Canonical LXD versions 4.12 through 6.7, the doCertificateUpdate function in lxd/certificates.go does not validate the Type field when handling PUT/PATCH requests to /1.0/certificates/{fingerprint} for restricted TLS certificate users, allowing a remote authenticated attacker to escalate privileges to cluster admin.

Action-Not Available
Vendor-Canonical Ltd.
Product-lxdlxd
CWE ID-CWE-915
Improperly Controlled Modification of Dynamically-Determined Object Attributes
CVE-2026-34178
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-9.1||CRITICAL
EPSS-0.05% / 16.31%
||
7 Day CHG~0.00%
Published-09 Apr, 2026 | 09:18
Updated-22 Apr, 2026 | 20:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Importing a crafted backup leads to project restriction bypass

In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing all project restriction enforcement and allowing full host compromise.

Action-Not Available
Vendor-Canonical Ltd.
Product-lxdlxd
CWE ID-CWE-20
Improper Input Validation
CVE-2026-34177
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-9.1||CRITICAL
EPSS-0.16% / 35.94%
||
7 Day CHG~0.00%
Published-09 Apr, 2026 | 09:15
Updated-22 Apr, 2026 | 20:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
VM lowlevel restriction bypass via raw.apparmor and raw.qemu.conf

Canonical LXD versions 4.12 through 6.7 contain an incomplete denylist in isVMLowLevelOptionForbidden (lxd/project/limits/permissions.go), which omits raw.apparmor and raw.qemu.conf from the set of keys blocked under the restricted.virtual-machines.lowlevel=block project restriction. A remote attacker with can_edit permission on a VM instance in a restricted project can inject an AppArmor rule and a QEMU chardev configuration that bridges the LXD Unix socket into the guest VM, enabling privilege escalation to LXD cluster administrator and subsequently to host root.

Action-Not Available
Vendor-Canonical Ltd.
Product-lxdlxd
CWE ID-CWE-184
Incomplete List of Disallowed Inputs
CVE-2026-28384
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-9.4||CRITICAL
EPSS-0.15% / 35.10%
||
7 Day CHG~0.00%
Published-12 Mar, 2026 | 14:51
Updated-13 Mar, 2026 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authenticated RCE via unsanitized compression_algorithm

An improper sanitization of the compression_algorithm parameter in Canonical LXD allows an authenticated, unprivileged user to execute commands as the LXD daemon on the LXD server via API calls to the image and backup endpoints. This issue affected LXD from 4.12 through 6.6 and was fixed in the snap versions 5.0.6-e49d9f4 (channel 5.0/stable), 5.21.4-1374f39 (channel 5.21/stable), and 6.7-1f11451 (channel 6.0 stable). The channel 4.0/stable is not affected as it contains version 4.0.10.

Action-Not Available
Vendor-Canonical Ltd.
Product-lxd
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-3351
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-2.1||LOW
EPSS-0.03% / 7.57%
||
7 Day CHG~0.00%
Published-03 Mar, 2026 | 12:49
Updated-11 Mar, 2026 | 18:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authorization Bypass in LXD GET /1.0/certificates Endpoint

Improper authorization in the API endpoint GET /1.0/certificates in Canonical LXD 6.6 on Linux allows an authenticated, restricted user to enumerate all certificate fingerprints trusted by the lxd server.

Action-Not Available
Vendor-Canonical Ltd.Linux Kernel Organization, Inc
Product-lxdlinux_kernellxd
CWE ID-CWE-862
Missing Authorization
CVE-2025-54293
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-7.1||HIGH
EPSS-0.08% / 24.29%
||
7 Day CHG~0.00%
Published-02 Oct, 2025 | 10:43
Updated-10 Dec, 2025 | 19:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path Traversal in LXD Instance Log File Retrieval

Path Traversal in the log file retrieval function in Canonical LXD 5.0 LTS on Linux allows authenticated remote attackers to read arbitrary files on the host system via crafted log file names or symbolic links.

Action-Not Available
Vendor-Linux Kernel Organization, IncCanonical Ltd.
Product-linux_kernellxdLXD
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-54292
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-4.8||MEDIUM
EPSS-0.04% / 11.13%
||
7 Day CHG~0.00%
Published-02 Oct, 2025 | 09:26
Updated-10 Dec, 2025 | 19:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Client-Side Path Traversal in LXD-UI

Path traversal in Canonical LXD LXD-UI versions before 6.5 and 5.21.4 on all platforms allows remote authenticated attackers to access or modify unintended resources via crafted resource names embedded in URL paths.

Action-Not Available
Vendor-Canonical Ltd.
Product-lxdLXD
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-54291
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-6.9||MEDIUM
EPSS-0.11% / 28.71%
||
7 Day CHG~0.00%
Published-02 Oct, 2025 | 09:25
Updated-24 Oct, 2025 | 14:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Project existence disclosure in LXD images API

Information disclosure in images API in Canonical LXD before 6.5 and 5.21.4 on all platforms allows unauthenticated remote attackers to determine project existence via differing HTTP status code responses.

Action-Not Available
Vendor-Canonical Ltd.
Product-lxdLXD
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-54290
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-6.9||MEDIUM
EPSS-0.12% / 30.33%
||
7 Day CHG~0.00%
Published-02 Oct, 2025 | 09:24
Updated-24 Oct, 2025 | 14:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Project Existence Disclosure via Error Handling in LXD Image Export

Information disclosure in image export API in Canonical LXD before 6.5 and 5.21.4 on Linux allows network attackers to determine project existence without authentication via crafted requests using wildcard fingerprints.

Action-Not Available
Vendor-Canonical Ltd.Linux Kernel Organization, Inc
Product-linux_kernellxdLXD
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-54289
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-7.4||HIGH
EPSS-0.04% / 13.21%
||
7 Day CHG~0.00%
Published-02 Oct, 2025 | 09:23
Updated-26 Feb, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege Escalation via WebSocket Connection Hijacking in LXD Operations API

Privilege Escalation in operations API in Canonical LXD <6.5 on multiple platforms allows attacker with read permissions to hijack terminal or console sessions and execute arbitrary commands via WebSocket connection hijacking format

Action-Not Available
Vendor-Canonical Ltd.
Product-lxdLXD
CWE ID-CWE-1385
Missing Origin Validation in WebSockets
CVE-2025-54288
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-5.1||MEDIUM
EPSS-0.06% / 18.47%
||
7 Day CHG~0.00%
Published-02 Oct, 2025 | 09:20
Updated-24 Oct, 2025 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Source Container Identification Vulnerability via cmdline Spoofing in devLXD Server

Information Spoofing in devLXD Server in Canonical LXD versions 4.0 and above on Linux container platforms allows attackers with root privileges within any container to impersonate other containers and obtain their metadata, configuration, and device information via spoofed process names in the command line.

Action-Not Available
Vendor-Canonical Ltd.Linux Kernel Organization, Inc
Product-linux_kernellxdLXD
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2025-54287
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-7.1||HIGH
EPSS-0.07% / 20.58%
||
7 Day CHG~0.00%
Published-02 Oct, 2025 | 09:16
Updated-22 Oct, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary File Read via Template Injection in Snapshot Patterns

Template Injection in instance snapshot creation component in Canonical LXD (>= 4.0) allows an attacker with instance configuration permissions to read arbitrary files on the host system via specially crafted snapshot pattern templates using the Pongo2 template engine.

Action-Not Available
Vendor-Canonical Ltd.Linux Kernel Organization, Inc
Product-linux_kernellxdLXD
CWE ID-CWE-1336
Improper Neutralization of Special Elements Used in a Template Engine
CVE-2025-54286
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-7.5||HIGH
EPSS-0.02% / 6.88%
||
7 Day CHG~0.00%
Published-02 Oct, 2025 | 09:12
Updated-26 Feb, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CSRF Vulnerability When Using Client Certificate Authentication with the LXD-UI

Cross-Site Request Forgery (CSRF) in LXD-UI in Canonical LXD versions >= 5.0 on Linux allows an attacker to create and start container instances without user consent via crafted HTML form submissions exploiting client certificate authentication.

Action-Not Available
Vendor-Canonical Ltd.Linux Kernel Organization, Inc
Product-linux_kernellxdLXD
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-6219
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-3.8||LOW
EPSS-0.16% / 36.79%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 23:13
Updated-13 Nov, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mark Laing discovered in LXD's PKI mode, until version 5.21.1, that a restricted certificate could be added to the trust store with its restrictions not honoured.

Action-Not Available
Vendor-Canonical Ltd.
Product-lxdLXD
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-6156
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-3.8||LOW
EPSS-0.05% / 16.36%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 23:11
Updated-26 Aug, 2025 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mark Laing discovered that LXD's PKI mode, until version 5.21.2, could be bypassed if the client's certificate was present in the trust store.

Action-Not Available
Vendor-Canonical Ltd.
Product-lxdLXDlxd
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-49721
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.85%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 21:57
Updated-26 Aug, 2025 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insecure default to allow UEFI Shell in EDK2 was left enabled in LXD. This allows an OS-resident attacker to bypass Secure Boot.

Action-Not Available
Vendor-tianocoreCanonical Ltd.
Product-edk2lxdLXDlxd
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-48733
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 3.11%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 21:54
Updated-26 Aug, 2025 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.

Action-Not Available
Vendor-tianocoreCanonical Ltd.Debian GNU/Linux
Product-edk2debian_linuxlxdUbuntu EDK II
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2015-1340
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-7||HIGH
EPSS-0.33% / 55.67%
||
7 Day CHG~0.00%
Published-22 Apr, 2019 | 15:35
Updated-17 Sep, 2024 | 01:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
chmod race in doUidshiftIntoContainer

LXD before version 0.19-0ubuntu5 doUidshiftIntoContainer() has an unsafe Chmod() call that races against the stat in the Filepath.Walk() function. A symbolic link created in that window could cause any file on the system to have any mode of the attacker's choice.

Action-Not Available
Vendor-linuxcontainersUbuntu
Product-lxdLXD
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2016-1582
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 12.23%
||
7 Day CHG~0.00%
Published-09 Jun, 2016 | 16:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LXD before 2.0.2 does not properly set permissions when switching an unprivileged container into privileged mode, which allows local users to access arbitrary world readable paths in the container directory via unspecified vectors.

Action-Not Available
Vendor-n/aCanonical Ltd.
Product-lxdubuntu_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-1581
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 10.27%
||
7 Day CHG~0.00%
Published-09 Jun, 2016 | 16:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LXD before 2.0.2 uses world-readable permissions for /var/lib/lxd/zfs.img when setting up a loop based ZFS pool, which allows local users to copy and read data from arbitrary containers via unspecified vectors.

Action-Not Available
Vendor-n/aCanonical Ltd.
Product-lxdubuntu_linuxn/a
CWE ID-CWE-284
Improper Access Control