CVE-2026-33898
Published: 27 March 2026
Summary
CVE-2026-33898 is a high-severity Improper Authentication (CWE-287) vulnerability in Linuxcontainers Incus. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 5.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring identification, testing, and installation of software patches that fix the improper authentication token validation in Incus webui.
Ensures proper management, protection, and validation of authentication tokens prior to use, addressing the webui's acceptance of invalid URL tokens.
Mandates enforcement of approved access authorizations at the web server, preventing unauthorized access via flawed token handling in Incus webui.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Auth bypass in localhost web UI directly enables local privilege escalation (T1068) via port discovery and token bypass; also facilitates exploitation of the exposed management web server (T1190) for unauthorized Incus/container access, including with user-interaction vectors.
NVD Description
Incus is a system container and virtual machine manager. Prior to version 6.23.0, the web server spawned by `incus webui` incorrectly validates the authentication token such that an invalid value will be accepted. `incus webui` runs a local web server…
more
on a random localhost port. For authentication, it provides the user with a URL containing an authentication token. When accessed with that token, Incus creates a cookie persisting that token without needing to include it in subsequent HTTP requests. While the Incus client correctly validates the value of the cookie, it does not correctly validate the token when passed int the URL. This allows for an attacker able to locate and talk to the temporary web server on localhost to have as much access to Incus as the user who ran `incus webui`. This can lead to privilege escalation by another local user or an access to the user's Incus instances and possibly system resources by a remote attack able to trick the local user into interacting with the Incus UI web server. Version 6.23.0 patches the issue.
Deeper analysisAI
Incus, a system container and virtual machine manager, contains a vulnerability in versions prior to 6.23.0 where the local web server spawned by the `incus webui` command incorrectly validates authentication tokens passed in the URL. The `incus webui` utility starts a temporary web server on a random localhost port and generates a URL with an authentication token for user access. Upon initial access, it sets a cookie that persists the token for subsequent requests without revalidation. While the Incus client properly checks cookie values, it accepts invalid tokens in the URL, enabling unauthorized authentication.
An attacker with the ability to locate and connect to the localhost web server can exploit this to gain full access to Incus instances with the privileges of the user who invoked `incus webui`. Local attackers, such as another user on the same system, can achieve privilege escalation by discovering the random port and bypassing authentication. Remote attackers require user interaction, such as tricking the victim into accessing a malicious URL or interacting with the UI, potentially granting access to the victim's Incus instances and associated system resources. The issue scores 8.8 on CVSS v3.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and maps to CWE-287 (Improper Authentication).
The GitHub security advisory at https://github.com/lxc/incus/security/advisories/GHSA-453r-g2pg-cxxq details the flaw, confirming that upgrading to Incus version 6.23.0 resolves the token validation issue. No additional mitigations are specified beyond applying the patch.
Details
- CWE(s)