<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-33897 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33897/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 23:16:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33897/feed.xml" rel="self" type="application/rss+xml"/><item><title>Incus Instance Template Vulnerability CVE-2026-33897</title><link>https://feed.craftedsignal.io/briefs/2024-01-incus-template-vuln/</link><pubDate>Thu, 26 Mar 2026 23:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-incus-template-vuln/</guid><description>A vulnerability in Incus versions prior to 6.23.0 allows for arbitrary read and write access as root on the host server by exploiting a missing chroot isolation in the pongo2 template engine.</description><content:encoded>&lt;p>Incus, a system container and virtual machine manager, is vulnerable to arbitrary read and write access as root due to a flaw in its instance template handling. Prior to version 6.23.0, the application lacks proper chroot isolation when processing pongo2 templates. These templates, intended for file templating within instances during their lifecycle, bypass the expected chroot, granting access to the entire host filesystem with root privileges. This vulnerability, identified as CVE-2026-33897…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>incus</category><category>template-injection</category><category>privilege-escalation</category><category>CVE-2026-33897</category><category>linux</category></item></channel></rss>