CVE-2026-30892
Crun incorrectly parses `crun exec` option `-u`, leading to privilege escalation
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
2th
crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.
| CWE | CWE-269 |
| Vendor | containers |
| Product | crun |
| Published | Mar 25, 2026 |
| Last Updated | Mar 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for containers crun
Be the first to know when new unknown vulnerabilities affecting containers crun are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
None
Affected Versions
containers / crun
>= 1.19, < 1.27