SecureDrop Client RCE: Server Compromise Leads to VM Takeover

SecureDrop Client RCE: Server Compromise Leads to VM Takeover

The National Vulnerability Database has detailed CVE-2026-35465, a high-severity code execution vulnerability in SecureDrop Client versions 0.17.4 and below. This flaw allows a compromised SecureDrop Server to execute arbitrary code within the Client’s virtual machine (sd-app). The root cause lies in improper filename validation during gzip archive extraction, specifically permitting absolute paths which enables overwriting critical files, such as the SQLite database.

Exploitation requires a prior compromise of the SecureDrop Server, a hardened system typically accessible only via Tor hidden services. While this elevates attack complexity, the impact on confidentiality, integrity, and availability of decrypted source submissions is severe. This vulnerability mirrors CVE-2025-24888 in nature but exploits a distinct code path. A more robust fix has reportedly been implemented in the successor SecureDrop Inbox codebase.

Defenders need to understand the attacker’s calculus here: this isn’t a direct internet-facing RCE. It’s a post-compromise attack vector, allowing an adversary who has already breached a SecureDrop Server to extend their control further into the journalist’s workstation. This escalates a server compromise into a full workstation takeover, enabling deeper espionage or sabotage against sensitive communications. The fix is available in SecureDrop Client version 0.17.5.

What This Means For You

  • If your organization operates SecureDrop Client versions 0.17.4 or below, you are exposed. This isn't theoretical; it's a critical RCE path if your SecureDrop Server is ever breached. Patch to version 0.17.5 immediately. Audit your SecureDrop Server for any signs of compromise, as that's the prerequisite for this client-side attack.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1566.002 Initial Access

CVE-2026-35465 - SecureDrop Client RCE via Malicious Archive

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-35465 RCE SecureDrop Client versions 0.17.4 and below
CVE-2026-35465 RCE Improper filename validation in gzip archive extraction
CVE-2026-35465 RCE Overwriting critical files like SQLite database via absolute paths
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 18, 2026 at 04:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-40490 — Open Redirect

CVE-2026-40490 — The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When redirect following is enabled (followRedirect(true)),...

vulnerabilityCVEmedium-severityopen-redirectcwe-200
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs /⚙ 3 Sigma

Postiz AI Tool Vulnerability Allows Account Takeover via XSS

CVE-2026-40487 — Postiz is an AI social media scheduling tool. Prior to version 2.21.6, a file upload validation bypass allows any authenticated user to upload...

vulnerabilityCVEhigh-severitycross-site-scripting-xsscwe-79cwe-345cwe-434
/SCW Vulnerability Desk /HIGH /⚑ 5 IOCs /⚙ 7 Sigma

Emissary Workflow Engine Vulnerable to OS Command Injection

CVE-2026-35582 — Emissary is a P2P based data-driven workflow engine. In versions 8.42.0 and below, Executrix.getCommand() is vulnerable to OS command injection because it interpolates...

vulnerabilityCVEhigh-severitycommand-injectioncwe-78cwe-116
/SCW Vulnerability Desk /HIGH /⚑ 3 IOCs /⚙ 2 Sigma