CVE-2026-30892

low-risk
Published 2026-03-26

crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.

Do I need to act?

-
0.01% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance

Affected Products (1)

Crun

Affected Vendors

9
/ 100
low-risk
Severity 4/34 · Minimal
Exploitability 0/34 · Minimal
Exposure 5/34 · Minimal