No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 18 Apr 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Neutrinolabs
Neutrinolabs xrdp |
|
| Vendors & Products |
Neutrinolabs
Neutrinolabs xrdp |
Fri, 17 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | xrdp is an open source RDP server. Versions through 0.10.5 allow an authenticated remote user to execute arbitrary commands on the server due to unsafe handling of the AlternateShell parameter in xrdp-sesman. When the AllowAlternateShell setting is enabled (which is the default when not explicitly configured), xrdp accepts a client-supplied AlternateShell value and executes it via /bin/sh -c during session initialization. This results in shell-interpreted execution of unsanitized, user-controlled input. This behavior effectively provides a scriptable remote command execution primitive over RDP within the security context of the authenticated user, occurring prior to normal window manager startup. This can bypass expected session initialization flows and operational assumptions that restrict execution to interactive desktop environments. This issue has been fixed in version 0.10.6. | |
| Title | xrdp: Authenticated RCE via unsanitized AlternateShell execution in xrdp-sesman | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-18T03:03:51.800Z
Reserved: 2026-03-17T20:35:49.930Z
Link: CVE-2026-33145
Updated: 2026-04-18T03:03:48.303Z
Status : Received
Published: 2026-04-17T21:16:32.610
Modified: 2026-04-17T21:16:32.610
Link: CVE-2026-33145
No data.
OpenCVE Enrichment
Updated: 2026-04-17T21:30:28Z