Wine ships a .desktop file that registers itself as a MIME handler for EXE files and several other Windows executable file types. In some configurations, handling of an EXE file causes that file to be blindly executed with the permissions of the invoker. This allows escaping Flatpak and Snap sandboxes, because MIME handlers are not intended for use by code interpreters and loaders. NOTE: some parties feel that this is not a bug to be addressed in Wine, because there is no known solution that avoids a severe loss of usability (Wine could be a binfmt-misc handler, but binfmt-misc does not exist on all platforms supported by Wine).
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
Remove /usr/share/applications/wine.desktop from the system to unregister the MIME handler that introduces the vulnerability.
References
History
Sun, 24 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Wine MIME handler can execute Windows executables with user privileges, allowing Flatpak/Snap sandbox escape |
Sun, 24 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wine ships a .desktop file that registers itself as a MIME handler for EXE files and several other Windows executable file types. In some configurations, handling of an EXE file causes that file to be blindly executed with the permissions of the invoker. This allows escaping Flatpak and Snap sandboxes, because MIME handlers are not intended for use by code interpreters and loaders. NOTE: some parties feel that this is not a bug to be addressed in Wine, because there is no known solution that avoids a severe loss of usability (Wine could be a binfmt-misc handler, but binfmt-misc does not exist on all platforms supported by Wine). | |
| First Time appeared |
Winehq
Winehq wine |
|
| Weaknesses | CWE-669 | |
| CPEs | cpe:2.3:a:winehq:wine:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Winehq
Winehq wine |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-24T20:52:36.535Z
Reserved: 2026-05-24T20:52:35.810Z
Link: CVE-2026-48831
No data.
No data.
No data.
OpenCVE Enrichment
Updated: 2026-05-24T22:30:09Z
Weaknesses