Use After Free Affecting freerdp/freerdp package, versions [,3.23.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.1% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-FREERDPFREERDP-15363356
  • published27 Feb 2026
  • disclosed25 Feb 2026
  • creditori-ron

Introduced: 25 Feb 2026

NewCVE-2026-27950  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade freerdp/freerdp to version 3.23.0 or higher.

Overview

Affected versions of this package are vulnerable to Use After Free in the update_pointer_new() function. An attacker can cause the application to crash by triggering a specific sequence of user interactions that exploit improper memory management.

Note:

This issue is due to the incomplete fix for CVE-2026-24680 which did not addres the problem for SDL2, only for SDL3.

CVSS Base Scores

version 4.0
version 3.1