Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. briefcase
  4. ›
  5. CVE-2026-33430

CVE-2026-33430: Briefcase: Windows MSI Installer Privilege Escalation via Insecure Directory Permissions

March 23, 2026

If a developer uses Briefcase to produce an Windows MSI installer for a project, and that project is installed for All Users (i.e., per-machine scope), the installation process creates an directory that inherits all the permissions of the parent directory. Depending on the location chosen by the installing user, this may allow a low privilege but authenticated user to replace or modify the binaries installed by the application. If an administrator then runs the altered binary, the binary will run with elevated privileges.

References

  • github.com/advisories/GHSA-r3r2-35v9-v238
  • github.com/beeware/briefcase
  • github.com/beeware/briefcase-windows-VisualStudio-template/pull/85
  • github.com/beeware/briefcase-windows-app-template/pull/86
  • github.com/beeware/briefcase/issues/2759
  • github.com/beeware/briefcase/security/advisories/GHSA-r3r2-35v9-v238
  • nvd.nist.gov/vuln/detail/CVE-2026-33430

Code Behaviors & Features

Detect and mitigate CVE-2026-33430 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.3.0 before 0.3.26

Fixed versions

  • 0.3.26

Solution

Upgrade to version 0.3.26 or above.

Impact 7.3 HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-732: Incorrect Permission Assignment for Critical Resource

Source file

pypi/briefcase/CVE-2026-33430.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:18:22 +0000.