CVE-2026-34078
Published: 07 April 2026
Summary
CVE-2026-34078 is a critical-severity UNIX Symbolic Link (Symlink) Following (CWE-61) vulnerability in Flatpak Flatpak. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Escape to Host (T1611); ranked at the 17.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the CVE by requiring timely patching of vulnerable Flatpak versions prior to 1.16.4 to fix the symlink path traversal in sandbox-expose options.
Enables identification of the vulnerable Flatpak installation through regular vulnerability scanning and monitoring of advisories such as GHSA-cc2q-qc34-jprg.
Reduces exploitation likelihood by prohibiting or restricting user installation of malicious Flatpak applications that abuse the sandbox-expose symlink vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables sandbox escape via symlink-controlled host path mounting in Flatpak, directly mapping to T1611 (Escape to Host) and facilitating T1068 (Exploitation for Privilege Escalation) for host code execution.
NVD Description
Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the Flatpak portal accepts paths in the sandbox-expose options which can be app-controlled symlinks pointing at arbitrary paths. Flatpak run mounts the resolved host path in the sandbox.…
more
This gives apps access to all host files and can be used as a primitive to gain code execution in the host context. This vulnerability is fixed in 1.16.4.
Deeper analysisAI
CVE-2026-34078 is a critical vulnerability in Flatpak, a Linux application sandboxing and distribution framework, affecting versions prior to 1.16.4. The issue stems from the Flatpak portal accepting paths in the sandbox-expose options that can be controlled by applications as symbolic links pointing to arbitrary host paths. When Flatpak run processes these, it mounts the resolved host path inside the sandbox, bypassing intended isolation and exposing host files to the sandboxed application. This flaw, associated with CWE-61 (Symbolic Link Race Condition), carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
The vulnerability can be exploited by remote attackers with no privileges or user interaction required, typically through a malicious Flatpak application distributed via untrusted sources. An attacker crafts an app-controlled symlink in the sandbox-expose options to target sensitive host paths, granting the sandboxed app read/write access to arbitrary host files upon execution via Flatpak run. This access serves as a primitive for achieving code execution in the host context, potentially leading to full system compromise on affected Linux systems using vulnerable Flatpak installations.
Advisories, including the Flatpak GitHub security advisory (GHSA-cc2q-qc34-jprg) and discussions on oss-security mailing lists, confirm the vulnerability is fixed in Flatpak 1.16.4. Security practitioners should prioritize upgrading to version 1.16.4 or later and review Flatpak configurations for exposed paths, particularly in environments distributing third-party Flatpak apps.
Details
- CWE(s)