CVE-2026-33430: Briefcase: Windows MSI Installer Privilege Escalation via Insecure Directory Permissions
If a developer uses Briefcase to produce an Windows MSI installer for a project, and that project is installed for All Users (i.e., per-machine scope), the installation process creates an directory that inherits all the permissions of the parent directory. Depending on the location chosen by the installing user, this may allow a low privilege but authenticated user to replace or modify the binaries installed by the application. If an administrator then runs the altered binary, the binary will run with elevated privileges.
References
- github.com/advisories/GHSA-r3r2-35v9-v238
- github.com/beeware/briefcase
- github.com/beeware/briefcase-windows-VisualStudio-template/pull/85
- github.com/beeware/briefcase-windows-app-template/pull/86
- github.com/beeware/briefcase/issues/2759
- github.com/beeware/briefcase/security/advisories/GHSA-r3r2-35v9-v238
- nvd.nist.gov/vuln/detail/CVE-2026-33430
Code Behaviors & Features
Detect and mitigate CVE-2026-33430 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →