Use After Free Affecting freerdp/freerdp package, versions [,3.23.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.06% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-FREERDPFREERDP-15363353
  • published27 Feb 2026
  • disclosed25 Feb 2026
  • creditKim Dong Han

Introduced: 25 Feb 2026

NewCVE-2026-25959  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade freerdp/freerdp to version 3.23.0 or higher.

Overview

Affected versions of this package are vulnerable to Use After Free through the xf_cliprdr_provide_data_() function. An attacker can cause the application to crash or become unresponsive by triggering a heap use-after-free condition during clipboard handling.

PoC

  1. Build xfreerdp with AddressSanitizer enabled.
  2. Start a sample RDP server with cliprdr support that responds to CB_FORMAT_DATA_REQUEST with dummy UTF-16LE data, and disconnects after 3 seconds to trigger auto-reconnect.
  3. Connect with xfreerdp /v:127.0.0.1:13390 /u:a /p:a /cert:ignore +clipboard +auto-reconnect /auto-reconnect-max-retries:20.
  4. Concurrently spam clipboard writes (xclip -selection clipboard) and reads (xclip -o -selection clipboard) to provoke format list re-sends (clearing the cache) and selection requests (triggering data responses).
  5. The cliprdr channel thread uses pDstData in XChangeProperty after the X11 thread freed it via HashTable_Clear — ASan detects heap-use-after-free in memcpy inside XChangeProperty.

CVSS Base Scores

version 4.0
version 3.1