Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the Flatpak portal accepts paths in the sandbox-expose options which can be app-controlled symlinks pointing at arbitrary paths. Flatpak run mounts the resolved host path in the sandbox. This gives apps access to all host files and can be used as a primitive to gain code execution in the host context. This vulnerability is fixed in 1.16.4.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Flatpak
Flatpak flatpak
Vendors & Products Flatpak
Flatpak flatpak

Wed, 08 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-59
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Moderate


Tue, 07 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
Description Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the Flatpak portal accepts paths in the sandbox-expose options which can be app-controlled symlinks pointing at arbitrary paths. Flatpak run mounts the resolved host path in the sandbox. This gives apps access to all host files and can be used as a primitive to gain code execution in the host context. This vulnerability is fixed in 1.16.4.
Title Flatpak has a complete sandbox escape leading to host file access and code execution in the host context
Weaknesses CWE-61
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T15:39:14.338Z

Reserved: 2026-03-25T16:21:40.868Z

Link: CVE-2026-34078

cve-icon Vulnrichment

Updated: 2026-04-08T15:39:09.938Z

cve-icon NVD

Status : Received

Published: 2026-04-07T22:16:21.930

Modified: 2026-04-07T22:16:21.930

Link: CVE-2026-34078

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-07T21:27:45Z

Links: CVE-2026-34078 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:34:05Z

Weaknesses