Oracle VM VirtualBox 7.2.6 Core Privileged Mod Vulnerability (CVE-2026-35249)
CVE-2026-35249 Published on April 21, 2026

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.2 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N).

Vendor Advisory NVD

Vulnerability Analysis

CVE-2026-35249 can be exploited with local system access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
CHANGED
Confidentiality Impact:
NONE
Integrity Impact:
LOW
Availability Impact:
NONE

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2026-35249 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2026-35249

stack.watch emails you whenever new vulnerabilities are published in Oracle or Oracle VM VirtualBox. Just hit a watch button to start following.

 
 

Affected Versions

Oracle Corporation Oracle VM VirtualBox Version 7.2.6 is affected by CVE-2026-35249