Impact
Incus, a container and virtual machine manager, runs a temporary local web server when the web UI is launched. The server fails to properly validate the authentication token supplied in the URL, accepting any token value. The token is then stored in a cookie without further verification, allowing an attacker who can reach the localhost port to authenticate as the original user. This flaw enables unauthorized access to all Incus instances and potentially system resources, constituting a significant privilege escalation risk.
Affected Systems
The vulnerability affects all LXC Incus installations prior to version 6.23.0. Users running any earlier Incus release that launches the web UI (incus webui) are at risk, while versions 6.23.0 and newer have the issue remediated.
Risk and Exploitability
The flaw carries a CVSS score of 8.8, indicating high severity, yet the EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog, suggesting low current exploitation likelihood. Nevertheless, the attack vector is local: an attacker must be able to connect to the random localhost port used by the web UI. A remote attacker could potentially manipulate a local user into accessing the token URL, turning the vulnerability into a social‑engineering vector. Given the severity score, the risk remains high.
OpenCVE Enrichment
Github GHSA