📦 Lxd

by Canonical

🔍 What is Lxd?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2025-54289

HIGH CVSS 8.1 Oct 2, 2025

This vulnerability allows attackers with read permissions in Canonical LXD to hijack terminal or console sessions via WebSocket connection hijacking, enabling arbitrary command execution and privilege...

CVE-2025-54286

HIGH CVSS 8.8 Oct 2, 2025

This CSRF vulnerability in LXD-UI allows attackers to create and start container instances without user consent by tricking authenticated users into submitting malicious HTML forms. It affects Canonic...

CVE-2025-54293

MEDIUM CVSS 6.5 Oct 2, 2025

This path traversal vulnerability in Canonical LXD 5.0 LTS allows authenticated remote attackers to read arbitrary files on the host system by manipulating log file names or symbolic links. It affects...

CVE-2025-54290

MEDIUM CVSS 5.3 Oct 2, 2025

This vulnerability allows unauthenticated network attackers to determine whether specific LXD projects exist by sending crafted requests with wildcard fingerprints to the image export API. It affects ...

CVE-2025-54291

MEDIUM CVSS 5.3 Oct 2, 2025

This vulnerability allows unauthenticated remote attackers to determine whether specific projects exist in Canonical LXD by observing different HTTP status code responses from the images API. This aff...

CVE-2025-54292

MEDIUM CVSS 4.6 Oct 2, 2025

This path traversal vulnerability in Canonical LXD LXD-UI allows authenticated attackers to access or modify resources outside intended directories by manipulating URL paths. It affects all platforms ...

CVE-2025-54287

MEDIUM CVSS 6.5 Oct 2, 2025

This vulnerability allows attackers with instance configuration permissions in Canonical LXD to perform template injection when creating instance snapshots. Using the Pongo2 template engine, they can ...

CVE-2025-54288

MEDIUM CVSS 6.8 Oct 2, 2025

This vulnerability allows attackers with root privileges inside any LXD container to spoof their process names to impersonate other containers. This enables them to access metadata, configuration, and...