Briefcase is a tool for converting a Python project into a standalone native application. Starting in version 0.3.0 and prior to version 0.3.26, if a developer uses Briefcase to produce an Windows MSI installer for a project, and that project is installed for All Users (i.e., per-machine scope), the installation process creates an directory that inherits all the permissions of the parent directory. Depending on the location chosen by the installing user, this may allow a low privilege but authenticated user to replace or modify the binaries installed by the application. If an administrator then runs the altered binary, the binary will run with elevated privileges. The problem is caused by the template used to generate the WXS file for Windows projects. It was fixed in the templates used in Briefcase 0.3.26, 0.4.0, and 0.4.1. Re-running `briefcase create` on your Briefcase project will result in the updated templates being used. As a workaround, the patch can be added to any existing Briefcase .wxs file generated by Briefcase 0.3.24 or later.
Briefcase: Windows MSI Installer Privilege Escalation via Insecure Directory Permissions
Problem type
Affected products
beeware
>= 0.3.0, < 0.3.26 - AFFECTED
References
https://github.com/beeware/briefcase/security/advisories/GHSA-r3r2-35v9-v238
https://github.com/beeware/briefcase/issues/2759
https://github.com/beeware/briefcase-windows-VisualStudio-template/pull/85
https://github.com/beeware/briefcase-windows-app-template/pull/86
GitHub Security Advisories
GHSA-r3r2-35v9-v238
Briefcase: Windows MSI Installer Privilege Escalation via Insecure Directory Permissions
https://github.com/advisories/GHSA-r3r2-35v9-v238Impact
If a developer uses Briefcase to produce an Windows MSI installer for a project, and that project is installed for All Users (i.e., per-machine scope), the installation process creates an directory that inherits all the permissions of the parent directory. Depending on the location chosen by the installing user, this may allow a low privilege but authenticated user to replace or modify the binaries installed by the application. If an administrator then runs the altered binary, the binary will run with elevated privileges.
Patches
The problem is caused by the template used to generate the WXS file for Windows projects. It was fixed with the following PRs:
- beeware/briefcase-windows-app-template#86
- beeware/briefcase-windows-VisualStudio-template#85
These patches have been backported to the templates used in Briefcase 0.3.26, 0.4.0, and 0.4.1. Re-running briefcase create on your Briefcase project will result in the updated templates being used.
Workarounds
The change from beeware/briefcase-windows-app-template#86 can be added to any existing Briefcase .wxs file generated by Briefcase 0.3.24 or later.
Resources
beeware/briefcase#2759 is a formal bug report of the problem.
https://github.com/beeware/briefcase/security/advisories/GHSA-r3r2-35v9-v238
https://github.com/beeware/briefcase/issues/2759
https://github.com/beeware/briefcase-windows-VisualStudio-template/pull/85
https://github.com/beeware/briefcase-windows-app-template/pull/86
https://nvd.nist.gov/vuln/detail/CVE-2026-33430
https://github.com/advisories/GHSA-r3r2-35v9-v238
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-33430Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-33430",
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"dateUpdated": "2026-03-26T18:24:04.179Z",
"dateReserved": "2026-03-19T18:45:22.435Z",
"datePublished": "2026-03-26T16:54:42.992Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M",
"dateUpdated": "2026-03-26T16:54:42.992Z"
},
"title": "Briefcase: Windows MSI Installer Privilege Escalation via Insecure Directory Permissions",
"descriptions": [
{
"lang": "en",
"value": "Briefcase is a tool for converting a Python project into a standalone native application. Starting in version 0.3.0 and prior to version 0.3.26, if a developer uses Briefcase to produce an Windows MSI installer for a project, and that project is installed for All Users (i.e., per-machine scope), the installation process creates an directory that inherits all the permissions of the parent directory. Depending on the location chosen by the installing user, this may allow a low privilege but authenticated user to replace or modify the binaries installed by the application. If an administrator then runs the altered binary, the binary will run with elevated privileges. The problem is caused by the template used to generate the WXS file for Windows projects. It was fixed in the templates used in Briefcase 0.3.26, 0.4.0, and 0.4.1. Re-running `briefcase create` on your Briefcase project will result in the updated templates being used. As a workaround, the patch can be added to any existing Briefcase .wxs file generated by Briefcase 0.3.24 or later."
}
],
"affected": [
{
"vendor": "beeware",
"product": "briefcase",
"versions": [
{
"version": ">= 0.3.0, < 0.3.26",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-732: Incorrect Permission Assignment for Critical Resource",
"cweId": "CWE-732",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://github.com/beeware/briefcase/security/advisories/GHSA-r3r2-35v9-v238",
"name": "https://github.com/beeware/briefcase/security/advisories/GHSA-r3r2-35v9-v238",
"tags": [
"x_refsource_CONFIRM"
]
},
{
"url": "https://github.com/beeware/briefcase/issues/2759",
"name": "https://github.com/beeware/briefcase/issues/2759",
"tags": [
"x_refsource_MISC"
]
},
{
"url": "https://github.com/beeware/briefcase-windows-VisualStudio-template/pull/85",
"name": "https://github.com/beeware/briefcase-windows-VisualStudio-template/pull/85",
"tags": [
"x_refsource_MISC"
]
},
{
"url": "https://github.com/beeware/briefcase-windows-app-template/pull/86",
"name": "https://github.com/beeware/briefcase-windows-app-template/pull/86",
"tags": [
"x_refsource_MISC"
]
}
],
"metrics": [
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
}
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2026-03-26T18:24:04.179Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}