๐Ÿ” CVE Alert

CVE-2026-34990

HIGH 7.8

OpenPrinting CUPS: Local print admin token disclosure using temporary printers

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
2th

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with a reusable Authorization: Local ... token. That token is enough to drive /admin/ requests on localhost, and the attacker can combine CUPS-Create-Local-Printer with printer-is-shared=true to persist a file:///... queue even though the normal FileDevice policy rejects such URIs. Printing to that queue gives an arbitrary root file overwrite; the PoC below uses that primitive to drop a sudoers fragment and demonstrate root command execution. At time of publication, there are no publicly available patches.

CWE CWE-287
Vendor openprinting
Product cups
Published Apr 3, 2026
Last Updated Apr 6, 2026
Stay Ahead of the Next One

Get instant alerts for openprinting cups

Be the first to know when new high vulnerabilities affecting openprinting cups are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

OpenPrinting / cups
<= 2.4.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/OpenPrinting/cups/security/advisories/GHSA-c54j-2vqw-wpwp