Vulnerability Details CVE-2026-40354
Flatpak xdg-desktop-portal before 1.20.4 and 1.21.x before 1.21.1 allows any Flatpak app to trash any file in the host context via a symlink attack on g_file_trash.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 4.9%
CVSS Severity
CVSS v3 Score 2.9
Products affected by CVE-2026-40354
-
cpe:2.3:a:flatpak:xdg-desktop-portal:0.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:0.10
-
cpe:2.3:a:flatpak:xdg-desktop-portal:0.11
-
cpe:2.3:a:flatpak:xdg-desktop-portal:0.2
-
cpe:2.3:a:flatpak:xdg-desktop-portal:0.3
-
cpe:2.3:a:flatpak:xdg-desktop-portal:0.4
-
cpe:2.3:a:flatpak:xdg-desktop-portal:0.5
-
cpe:2.3:a:flatpak:xdg-desktop-portal:0.6
-
cpe:2.3:a:flatpak:xdg-desktop-portal:0.7
-
cpe:2.3:a:flatpak:xdg-desktop-portal:0.8
-
cpe:2.3:a:flatpak:xdg-desktop-portal:0.9
-
cpe:2.3:a:flatpak:xdg-desktop-portal:0.99
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.0.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.0.2
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.0.3
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.1.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.1.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.10.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.10.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.12.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.12.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.12.2
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.12.3
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.12.4
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.12.5
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.12.6
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.14.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.14.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.14.2
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.14.3
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.14.4
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.14.5
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.14.6
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.15.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.16.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.16.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.17.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.17.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.17.2
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.18.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.18.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.18.2
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.18.3
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.18.4
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.19.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.19.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.19.2
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.19.3
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.19.4
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.2.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.20.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.20.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.20.2
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.20.3
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.21.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.4.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.4.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.4.2
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.5.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.5.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.5.2
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.5.3
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.5.4
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.6.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.7.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.7.1
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.7.2
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.8.0
-
cpe:2.3:a:flatpak:xdg-desktop-portal:1.8.1