PT-2026-37225 · Unknown · Sandboxie Plus
Sammy12342
·
Published
2026-05-05
·
Updated
2026-05-05
·
CVE-2026-34458
CVSS v4.0
9.3
Critical
| Vector | AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H |
Name of the Vulnerable Software and Affected Versions
Sandboxie-Plus versions prior to 1.17.3
Description
An INI injection issue allows a standard local user to bypass configuration restrictions, specifically
EditAdminOnly and ConfigPassword, to inject arbitrary directives into the global Sandboxie.ini configuration file. The background service fails to perform authorization checks for IPC (Inter-Process Communication) messages targeting sections starting with UserSettings and does not sanitize CRLF (Carriage Return Line Feed) characters in the value parameter via MSGID SBIE INI ADD SETTING or the setting name parameter via MSGID SBIE INI SET SETTING. This allows an attacker to inject a new sandbox section header with unrestricted permissions, leading to sandbox escape and SYSTEM privilege escalation.Recommendations
Update to version 1.17.3.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Sandboxie Plus