Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
Published: 2026-04-21
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: Local Privilege Escalation Leading to VirtualBox Compromise
Action: Patch
AI Analysis

Impact

In Oracle VirtualBox version 7.2.6, a difficult‑to‑exploit flaw allows a local attacker who already has high privileges to compromise the VirtualBox process, granting full control over the virtualization host and potentially any virtual machines it manages. The identified weakness can affect confidentiality, integrity, and availability, and the scope change indicates that compromise of VirtualBox may propagate to additional products that rely on the virtualization stack.

Affected Systems

The affected product is Oracle Corporation’s Oracle VM VirtualBox, specifically version 7.2.6. Any host running this version is vulnerable to the described local privilege escalation and subsequent takeover.

Risk and Exploitability

The CVSS vector shows a local attack surface, high privilege account, no user interaction, and a scope change, yielding a Base Score of 7.5. No public exploit is known and the EPSS score is unavailable, but an attacker who can log on to the host as a privileged user could leverage this flaw. The vulnerability is not listed in CISA’s KEV catalog, suggesting limited evidence of active exploitation, yet the potential impact on systems that run VirtualBox remains significant.

Generated by OpenCVE AI on April 22, 2026 at 06:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Oracle VM VirtualBox to version 7.2.7 or later to apply the vendor patch that fixes the flaw
  • Restrict local administrative access to the VirtualBox installation so that only trusted users can logon where VirtualBox runs, thereby limiting the pool of accounts that could exploit the vulnerability
  • Segment virtual machine hosts from critical infrastructure and monitor for anomalous activity to contain the risk of a compromised VirtualBox affecting other systems

Generated by OpenCVE AI on April 22, 2026 at 06:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 06:45:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation in Oracle VM VirtualBox 7.2.6 Allows Full Compromise
Weaknesses CWE-269
CWE-732

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
First Time appeared Oracle
Oracle vm Virtualbox
CPEs cpe:2.3:a:oracle:vm_virtualbox:7.2.6:*:*:*:*:*:*:*
Vendors & Products Oracle
Oracle vm Virtualbox
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Oracle Vm Virtualbox
cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2026-04-21T20:35:49.866Z

Reserved: 2026-04-01T20:03:40.833Z

Link: CVE-2026-35242

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-21T21:16:40.120

Modified: 2026-04-21T21:16:40.120

Link: CVE-2026-35242

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T06:30:10Z

Weaknesses