CVE-2026-0776 – Discord Client

CVSS 7.3 IMPORTANT

“Even everyday apps can become entry points if input isn’t handled right.”

Discord addressed a high-severity vulnerability in its client that could allow attackers to exploit improper input handling and potentially execute unintended actions on a user’s system. The issue affects how the client processes certain data, creating a risk when interacting with untrusted content. CVE-2026-0776 has a CVSS score of 7.3, which is High severity. This makes it a notable concern given the platform’s widespread use and constant exposure to external inputs.

No verified real-world exploitation or proof-of-concept code has been confirmed. Still, the nature of the vulnerability increases risk in environments where users frequently interact with unknown links or content. The patch improves input validation and strengthens safeguards within the client to prevent misuse.

Key Details

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
CWE Classification
CWE-427
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.