CUPS 2.4.16- Prior: Local Auth Abuse Enables Root File Override
CVE-2026-34990 Published on April 3, 2026

OpenPrinting CUPS: Local print admin token disclosure using temporary printers
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with a reusable Authorization: Local ... token. That token is enough to drive /admin/ requests on localhost, and the attacker can combine CUPS-Create-Local-Printer with printer-is-shared=true to persist a file:///... queue even though the normal FileDevice policy rejects such URIs. Printing to that queue gives an arbitrary root file overwrite; the PoC below uses that primitive to drop a sudoers fragment and demonstrate root command execution. At time of publication, there are no publicly available patches.

NVD

Weakness Type

What is an authentification Vulnerability?

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE-2026-34990 has been classified to as an authentification vulnerability or weakness.


Products Associated with CVE-2026-34990

Want to know whenever a new CVE is published for Openprinting Cups? stack.watch will email you.

 

Affected Versions

OpenPrinting cups Version <= 2.4.16 is affected by CVE-2026-34990