Arbitrary Code Injection Affecting libinput package, versions <1.30.3-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALPINE323-LIBINPUT-15918266
  • published6 Apr 2026
  • disclosed1 Apr 2026

Introduced: 1 Apr 2026

NewCVE-2026-35093  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade Alpine:3.23 libinput to version 1.30.3-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libinput package and not the libinput package as distributed by Alpine. See How to fix? for Alpine:3.23 relevant fixed versions and status.

A flaw was found in libinput. A local attacker who can place a specially crafted Lua bytecode file in certain system or user configuration directories can bypass security restrictions. This allows the attacker to run unauthorized code with the same permissions as the program using libinput, such as a graphical compositor. This could lead to the attacker monitoring keyboard input and sending that information to an external location.

CVSS Base Scores

version 3.1