Security Reports

This page lists all security vulnerabilities fixed in released versions of Apache Guacamole. Each vulnerability is listed with a description of the problem, its associated CVE number, and the Guacamole release in which the vulnerability was fixed.

Reporting new vulnerabilities

If you believe you have discovered a security problem in Apache Guacamole, please follow responsible disclosure practices and report discovered security issues privately, either to the private security mailing list of the ASF Security Team or the security@guacamole.apache.org mailing list, before disclosing or discussing the issue in a public forum.

Vulnerabilities in dependencies

Is Apache Guacamole affected by CVE-2023-5129?

No. CVE-2023-5129 (aka CVE-2023-4863) deals specifically with decoding WebP images, not encoding.

You would also receive updates to libwebp from your distribution as the library itself is not bundled within Guacamole. If using our Docker images, the images are automatically rebuilt nightly to bring in updates from the maintainer of the base image (Alpine Linux), and a pull of the latest would give you an updated image.

Is Apache Guacamole affected by CVE-2021-44228?

No, CVE-2021-44228 does not affect Apache Guacamole. Guacamole uses Logback as its logging backend, not Log4j.

Is Apache Guacamole affected by AngularJS vulnerabilities?

No. We routinely check for known vulnerabilities in AngularJS and manually verify that Guacamole is not impacted by each.

CVE ID Analysis
CVE-2022-25844

This is a potential regular expression denial of service in AngularJS’ handling of locale rules. This cannot affect Guacamole, which does not construct locale rules with untrusted data.

CVE-2022-25869

This vulnerability is specific to Internet Explorer and its potentially insecure caching of <textarea> element contents. This cannot affect Guacamole, which does not load <textarea> elements in a way that Internet Explorer is capable of caching.

CVE-2023-26116

This is a potential regular expression denial of service in AngularJS’ angular.copy() utility function. This cannot affect Guacamole, which does not pass untrusted data to this function.

CVE-2023-26117

This is a potential regular expression denial of service in AngularJS’ $resource service. This cannot affect Guacamole, which does not make use of the $resource service, let alone pass untrusted data to it.

CVE-2023-26118

This is a potential regular expression denial of service in AngularJS’ handling of <input type="url"> elements. This cannot affect Guacamole, which does not use these elements.

CVE-2024-21490

This is a potential regular expression denial of service in AngularJS’ ng-srcset directive. This cannot affect Guacamole which does not use this directive, let alone pass untrusted data to it.

CVE-2024-8372

This is a potential bypass of AngularJS’ image source restriction capabilities specific to the srcset attribute. This cannot affect Guacamole, which does not rely on AngularJS to restrict image sources.

CVE-2024-8373

This is a potential bypass of AngularJS’ image source restriction capabilities specific to the srcset attribute of <source> elements. This cannot affect Guacamole, which does not rely on AngularJS to restrict image sources.

CVE-2025-0716

This is a potential bypass of AngularJS’ image source restriction capabilities specific to the href and xlink:href attributes of <image> tags within SVG content. This cannot affect Guacamole, which does not rely on AngularJS to restrict image sources.

If you believe a new vulnerability in AngularJS may require specific remediation within Guacamole, please reach out to us by sending an email to security@guacamole.apache.org and we will investigate promptly. If a potential vulnerability in AngularJS does need to be addressed, we will work with you to issue a release of Guacamole that addresses it.

Releases of Guacamole 1.x will continue to use AngularJS for compatibility, while Guacamole 2.0.0 onward is planned to use Angular (the TypeScript-based framework that supersedes AngularJS).

Fixed in Apache Guacamole 1.6.0

Fixed in Apache Guacamole 1.5.4

Fixed in Apache Guacamole 1.5.2

Fixed in Apache Guacamole 1.4.0

Fixed in Apache Guacamole 1.3.0

Fixed in Apache Guacamole 1.2.0

Fixed in Apache Guacamole 1.0.0

Fixed in Guacamole 0.9.9 (pre-Apache release)

Fixed in Guacamole 0.6.3 (pre-Apache release)