Vulnerability Description
Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, a Time-of-Check-to-Time-of-Use (TOCTOU) race condition exists during addon installation. When a user installs an addon through the SandMan interface, UpdUtil.exe is spawned as SYSTEM by SbieSvc but stages files in the user-writable %TEMP%\sandboxie-updater directory. After UpdUtil verifies file hashes against the signed addon manifest, install.bat extracts files.cab and executes config.exe from its contents. Between hash verification and extraction, an unprivileged user can replace files.cab with a crafted cabinet containing a malicious executable, which is then run as SYSTEM. No UAC prompt is required. This issue has been fixed in version 1.17.3.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sandboxie-Plus | Sandboxie | < 1.17.3 |
Related Weaknesses (CWE)
References
- https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-xjvp-63f2-vExploitVendor Advisory
- https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-xjvp-63f2-vExploitVendor Advisory
FAQ
What is CVE-2026-34596?
CVE-2026-34596 is a vulnerability with a CVSS score of 7.0 (HIGH). Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, a Time-of-Check-to-Time-of-Use (TOCTOU) race condition exists during addon installation. ...
How severe is CVE-2026-34596?
CVE-2026-34596 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34596?
Check the references section above for vendor advisories and patch information. Affected products include: Sandboxie-Plus Sandboxie.