xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in the NeutrinoRDP module. When proxying RDP sessions from xrdp to another server, the module fails to properly validate the size of reassembled fragmented virtual channel data against its allocated memory buffer. A malicious downstream RDP server (or an attacker capable of performing a Man-in-the-Middle attack) could exploit this flaw to cause memory corruption, potentially leading to a Denial of Service (DoS) or Remote Code Execution (RCE). The NeutrinoRDP module is not built by default. This vulnerability only affects environments where the module has been explicitly compiled and enabled. Users can verify if the module is built by checking for --enable-neutrinordp in the output of the xrdp -v command. This issue has been fixed in version 0.10.6.
References
| Link | Resource |
|---|---|
| https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6 | Patch Release Notes |
| https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-phw3-qp59-x2v4 | Vendor Advisory |
Configurations
History
27 Apr 2026, 14:18
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:neutrinolabs:xrdp:*:*:*:*:*:*:*:* | |
| First Time |
Neutrinolabs
Neutrinolabs xrdp |
|
| References | () https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6 - Patch, Release Notes | |
| References | () https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-phw3-qp59-x2v4 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
17 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-17 20:16
Updated : 2026-04-27 14:18
NVD link : CVE-2026-32623
Mitre link : CVE-2026-32623
CVE.ORG link : CVE-2026-32623
JSON object : View
Products Affected
neutrinolabs
- xrdp
CWE
CWE-122
Heap-based Buffer Overflow
