CVE-2026-32107
Privilege Escalation in xrdp Session Execution Component
Publication date: 2026-04-17
Last updated on: 2026-04-27
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| neutrinolabs | xrdp | to 0.10.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-273 | The product attempts to drop privileges but does not check or incorrectly checks to see if the drop succeeded. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows an authenticated local attacker to escalate privileges to root and execute arbitrary code on the system due to improper privilege management in xrdp versions through 0.10.5.
Such a privilege escalation and potential unauthorized code execution could lead to unauthorized access to sensitive data or system controls, which may impact compliance with standards and regulations like GDPR and HIPAA that require strict access controls and protection of sensitive information.
However, the provided information does not explicitly describe the direct impact on compliance with these standards.
Can you explain this vulnerability to me?
This vulnerability exists in xrdp, an open source Remote Desktop Protocol (RDP) server. In versions up to 0.10.5, the component responsible for session execution did not correctly handle errors during the process of dropping privileges. This improper handling could allow an authenticated local attacker to escalate their privileges to root level and execute arbitrary code on the affected system.
To exploit this vulnerability, an attacker must already have local authentication access and would need an additional exploit to fully leverage the privilege escalation.
The issue has been fixed in version 0.10.6 of xrdp.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an authenticated local attacker to gain root privileges on the system running xrdp. This means the attacker could execute arbitrary code with the highest level of system permissions.
Such an escalation could lead to full system compromise, including unauthorized access to sensitive data, modification or deletion of files, installation of malicious software, and disruption of system operations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade xrdp to version 0.10.6 or later, where the issue has been fixed.