Description
Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, an INI injection vulnerability allows any standard local user to bypass configuration restrictions (EditAdminOnly and ConfigPassword) and inject arbitrary directives into the global Sandboxie.ini configuration file. The background service skips authorization checks for IPC messages targeting sections beginning with UserSettings_, but does not sanitize CRLF characters in either the value parameter (via MSGID_SBIE_INI_ADD_SETTING) or the setting name parameter (via MSGID_SBIE_INI_SET_SETTING). An attacker can inject a new sandbox section header with unrestricted permissions, enabling sandbox escape and SYSTEM privilege escalation. This issue has been fixed in version 1.17.3.
Published: 2026-05-05
Score: 9.3 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Sandboxie-Plus versions 1.17.2 and earlier contain an INI injection flaw that permits a standard local user to bypass configuration restrictions such as EditAdminOnly and ConfigPassword, thereby injecting arbitrary directives into the global Sandboxie.ini file. The vulnerability is triggered through non‑sanitized CRLF characters in both the value and setting name parameters handled by the background service. By creating a new sandbox section header with unrestricted permissions, an attacker can escape the sandbox and obtain SYSTEM privileges. The weakness manifests as a configuration injection (CWE‑93) that directly compromises the integrity of the sandbox isolation mechanism.

Affected Systems

Affected products include the Sandboxie-Plus application known as Sandboxie. Any installation running version 1.17.2 or earlier is vulnerable. The issue was fixed in the subsequent release, version 1.17.3, which removes the privilege escalation vector and enforces proper authorization checks.

Risk and Exploitability

The CVSS score of 9.3 signals a critical risk level. Although an EPSS score is not available, the lack of listing in the CISA KEV catalog does not diminish the potential impact. The attack vector is local: a non‑administrator account can exploit the INI injection through normal user privileges and elevate itself to SYSTEM by manipulating the configuration file carried by the privileged background service. Due to the high severity and the straightforward local exploitation path, this vulnerability poses a significant threat to Windows systems running the affected version of Sandboxie-Plus.

Generated by OpenCVE AI on May 5, 2026 at 21:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Sandboxie-Plus to version 1.17.3 or later, which eliminates the INI injection flaw.
  • Restrict file system permissions so that only administrator accounts can modify Sandboxie.ini, preventing standard users from injecting new settings.
  • If a patch is unavailable, disable the ability for local users to edit configuration files or enforce a configuration password to block unauthorized changes.

Generated by OpenCVE AI on May 5, 2026 at 21:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Sandboxie-plus
Sandboxie-plus sandboxie
Vendors & Products Sandboxie-plus
Sandboxie-plus sandboxie

Tue, 05 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, an INI injection vulnerability allows any standard local user to bypass configuration restrictions (EditAdminOnly and ConfigPassword) and inject arbitrary directives into the global Sandboxie.ini configuration file. The background service skips authorization checks for IPC messages targeting sections beginning with UserSettings_, but does not sanitize CRLF characters in either the value parameter (via MSGID_SBIE_INI_ADD_SETTING) or the setting name parameter (via MSGID_SBIE_INI_SET_SETTING). An attacker can inject a new sandbox section header with unrestricted permissions, enabling sandbox escape and SYSTEM privilege escalation. This issue has been fixed in version 1.17.3.
Title Sandboxie-Plus privilege escalation via INI CRLF injection bypassing EditAdminOnly
Weaknesses CWE-93
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Sandboxie-plus Sandboxie
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-05T19:24:05.638Z

Reserved: 2026-03-27T18:18:14.895Z

Link: CVE-2026-34458

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T20:16:37.163

Modified: 2026-05-05T20:16:37.163

Link: CVE-2026-34458

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T21:30:05Z

Weaknesses