Description
xdg-dbus-proxy is a filtering proxy for D-Bus connections. Prior to 0.1.7, a policy parser vulnerability allows bypassing eavesdrop restrictions. The proxy checks for eavesdrop=true in policy rules but fails to handle eavesdrop ='true' (with a space before the equals sign) and similar cases. Clients can intercept D-Bus messages they should not have access to. This vulnerability is fixed in 0.1.7.
Published: 2026-04-07
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Message Interception via D-Bus
Action: Apply Patch
AI Analysis

Impact

The xdg-dbus-proxy service parses policy rules to enforce whether a client may eavesdrop on D-Bus traffic. A flaw in the parser allows a client to supply a value such as "eavesdrop ='true'"—with a space before the equals sign—causing the proxy to incorrectly interpret the flag as true and permit message interception. This can be used by a malicious D-Bus client to observe messages it should not access. The effect is data confidentiality loss within the D-Bus ecosystem.

Affected Systems

Flatpak’s xdg-dbus-proxy version 0.1.6 and earlier are affected. The issue is fixed in version 0.1.7 and later; no other products are impacted.

Risk and Exploitability

The CVSS score of 6.8 indicates moderate severity, while the EPSS score is less than 1 % and the vulnerability is not listed in the CISA KEV catalog, implying a low likelihood of exploitation in the wild. The likely attack vector requires local access or a compromised client that can influence policy processing; remote exploitation without additional local privileges is not described. The risk is moderate for environments that rely on strict D-Bus access controls but should still be mitigated promptly.

Generated by OpenCVE AI on April 14, 2026 at 20:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade xdg-dbus-proxy to version 0.1.7 or newer.

Generated by OpenCVE AI on April 14, 2026 at 20:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4542-1 xdg-dbus-proxy security update
Debian DSA Debian DSA DSA-6209-1 xdg-dbus-proxy security update
Debian DSA Debian DSA DSA-6224-1 xdg-dbus-proxy security update
Ubuntu USN Ubuntu USN USN-8167-1 xdg-dbus-proxy vulnerability
History

Tue, 21 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
References

Tue, 14 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:flatpak:xdg-dbus-proxy:*:*:*:*:*:*:*:*

Sat, 11 Apr 2026 03:30:00 +0000

Type Values Removed Values Added
References

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Flatpak
Flatpak xdg-dbus-proxy
Vendors & Products Flatpak
Flatpak xdg-dbus-proxy

Wed, 08 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1286
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

threat_severity

Moderate


Tue, 07 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Description xdg-dbus-proxy is a filtering proxy for D-Bus connections. Prior to 0.1.7, a policy parser vulnerability allows bypassing eavesdrop restrictions. The proxy checks for eavesdrop=true in policy rules but fails to handle eavesdrop ='true' (with a space before the equals sign) and similar cases. Clients can intercept D-Bus messages they should not have access to. This vulnerability is fixed in 0.1.7.
Title xdg-dbus-proxy has an eavesdrop filter bypass allowing message interception
Weaknesses CWE-1289
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Flatpak Xdg-dbus-proxy
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T12:21:20.635Z

Reserved: 2026-03-25T16:21:40.868Z

Link: CVE-2026-34080

cve-icon Vulnrichment

Updated: 2026-04-21T12:21:20.635Z

cve-icon NVD

Status : Modified

Published: 2026-04-07T21:17:17.720

Modified: 2026-04-21T13:16:20.243

Link: CVE-2026-34080

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-07T20:57:57Z

Links: CVE-2026-34080 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:15:11Z