Home

Description

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, in a network-exposed cupsd with a shared target queue, an unauthorized client can send a Print-Job to that shared PostScript queue without authentication. The server accepts a page-border value supplied as textWithoutLanguage, preserves an embedded newline through option escaping and reparse, and then reparses the resulting second-line PPD: text as a trusted scheduler control record. A follow-up raw print job can therefore make the server execute an attacker-chosen existing binary such as /usr/bin/vim as lp. At time of publication, there are no publicly available patches.

PUBLISHED Reserved 2026-03-31 | Published 2026-04-03 | Updated 2026-04-06 | Assigner GitHub_M




MEDIUM: 6.1CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-20: Improper Input Validation

Product status

<= 2.4.16
affected

References

github.com/...g/cups/security/advisories/GHSA-4852-v58g-6cwf

cve.org (CVE-2026-34980)

nvd.nist.gov (CVE-2026-34980)

Download JSON