Description
crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.
Published: 2026-03-25
Score: 0 Low
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch Immediately
AI Analysis

Impact

An flaw in the crun container runtime’s exec command incorrectly interprets the user option –u/--user, causing the value "1" to be treated as UID 0 rather than UID 1. The result is that a process started inside a container runs with full root privileges. This is an example of CWE‑115 (incorrect validation of input) and CWE‑269 (identity confusion).

Affected Systems

The vulnerability affects crun, the open‑source OCI container runtime from the Crun Project, in releases 1.19 through 1.26. Version 1.27 and later contain the fix.

Risk and Exploitability

The EPSS score is below 1% and the flaw is not listed in CISA’s KEV catalog, suggesting few observed exploits to date. Nonetheless, the potential impact is severe because privilege escalation from a non‑root container process to UID 0 can compromise the host. The attack is likely local; any user able to invoke crun exec with the erroneous -u option can exploit it. If the runtime is accessible from untrusted networks, the risk grows. Applying the patched release or disabling the errant option removes the threat.

Generated by OpenCVE AI on March 27, 2026 at 14:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade crun to version 1.27 or later to apply the security fix.

Generated by OpenCVE AI on March 27, 2026 at 14:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-115
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 26 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Crun Project
Crun Project crun
CPEs cpe:2.3:a:crun_project:crun:*:*:*:*:*:*:*:*
Vendors & Products Crun Project
Crun Project crun

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Containers
Containers crun
Vendors & Products Containers
Containers crun

Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Description crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.
Title Crun incorrectly parses `crun exec` option `-u`, leading to privilege escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N'}


Subscriptions

Containers Crun
Crun Project Crun
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T18:10:16.318Z

Reserved: 2026-03-06T00:04:56.701Z

Link: CVE-2026-30892

cve-icon Vulnrichment

Updated: 2026-03-26T18:09:59.199Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T00:16:38.953

Modified: 2026-03-27T20:29:27.293

Link: CVE-2026-30892

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-25T23:57:01Z

Links: CVE-2026-30892 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T15:47:48Z

Weaknesses