CVE-2026-34078 PUBLISHED

Flatpak has a complete sandbox escape leading to host file access and code execution in the host context

Assigner: GitHub_M
Reserved: 25.03.2026 Published: 07.04.2026 Updated: 08.04.2026

Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the Flatpak portal accepts paths in the sandbox-expose options which can be app-controlled symlinks pointing at arbitrary paths. Flatpak run mounts the resolved host path in the sandbox. This gives apps access to all host files and can be used as a primitive to gain code execution in the host context. This vulnerability is fixed in 1.16.4.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor flatpak
Product flatpak
Versions
  • Version < 1.16.4 is affected

References

Problem Types

  • CWE-61: UNIX Symbolic Link (Symlink) Following CWE