Impact
A flaw in the Incus web UI causes it to accept any authentication token supplied via the launch URL, creating a session cookie without validating the token. This is a classic authentication bypass identified as CWE‑287. As a result, a local attacker who succeeds in finding the temporary web server can obtain the same access rights as the user who started incus webui, effectively elevating privileges on the host.
Affected Systems
Incus, the LXC container and virtual machine manager, is affected in all releases prior to version 6.23.0. The vulnerability resides in the web server component initiated by the incus webui command and exposes a random localhost port for clients. Any deployment that uses the web UI for management is susceptible.
Risk and Exploitability
The CVSS score of 8.8 reflects high severity, and the exploit requires only local access to the random localhost port, making it feasible for a local user or a socially engineered victim. EPSS data is not available, and the issue is not listed in CISA’s KEV catalog, but the high score indicates significant risk if the attack vector is realized. A successful bypass allows the attacker to control Incus instances, potentially affecting system resources and compromising host integrity.
OpenCVE Enrichment