Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-34990— OpenPrinting CUPS: Local print admin token disclosure using temporary printers

EPSS 0.01% · P2
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-34990

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
OpenPrinting CUPS: Local print admin token disclosure using temporary printers
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with a reusable Authorization: Local ... token. That token is enough to drive /admin/ requests on localhost, and the attacker can combine CUPS-Create-Local-Printer with printer-is-shared=true to persist a file:///... queue even though the normal FileDevice policy rejects such URIs. Printing to that queue gives an arbitrary root file overwrite; the PoC below uses that primitive to drop a sudoers fragment and demonstrate root command execution. At time of publication, there are no publicly available patches.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
认证机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenPrinting CUPS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenPrinting CUPS是OpenPrinting公司的一个适用于 Linux® 和其他类 Unix® 操作系统的基于标准的开源打印系统。 OpenPrinting CUPS 2.4.16及之前版本存在安全漏洞,该漏洞源于本地非特权用户可以强制cupsd使用可重用的授权令牌向攻击者控制的本地IPP服务进行身份验证,可能导致任意root文件覆盖和root命令执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
OpenPrintingcups <= 2.4.16 -

II. Public POCs for CVE-2026-34990

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-34990

登录查看更多情报信息。

Same Patch Batch · OpenPrinting · 2026-04-03 · 5 CVEs total

CVE-2026-349786.5 MEDIUMOpenPrinting CUPS: Path traversal in RSS notify-recipient-uri enables file write outside C
CVE-2026-349795.3 MEDIUMOpenPrinting CUPS: Heap overflow in `get_options()`
CVE-2026-274474.8 MEDIUMOpenPrinting CUPS: Authorization bypass via case-insensitive group-member lookup
CVE-2026-34980OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` co

IV. Related Vulnerabilities

V. Comments for CVE-2026-34990

No comments yet


Leave a comment