CVE-2026-0776
Uncontrolled Search Path Vulnerability in Discord RPC Module Enables Local Privilege Escalation
Publication date: 2026-01-23
Last updated on: 2026-01-23
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| discord | client | From 2025-07-08 (inc) to 2026-01-09 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-0776 is a local privilege escalation vulnerability in the Discord Client, specifically in the discord_rpc module. The vulnerability occurs because the product loads a file from an unsecured location. This flaw allows a local attacker, who already has the ability to execute low-privileged code on the target system, to escalate their privileges and execute arbitrary code in the context of the target user. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker with limited access to your system to escalate their privileges, potentially gaining higher-level access and control. They could execute arbitrary code with the privileges of the targeted user, which may lead to unauthorized access to sensitive information, modification or deletion of data, and disruption of system availability. [1]
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation is to restrict interaction with the Discord Client to prevent exploitation of the vulnerability. [1]