CVE-2022-27817
Description
SWHKD 1.1.5 consumes the keyboard events of unintended users. This could potentially cause an information leak, but is usually a denial of functionality.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SWHKD 1.1.5's daemon consumes keyboard events from all users, enabling information leak or denial of service on multi-user systems.
Vulnerability
SWHKD 1.1.5, a hotkey daemon for Wayland, runs with root privileges and captures keyboard events from all users on the system, not only the intended user. This is due to the daemon's design that does not isolate input per seat or user. [1][2]
Exploitation
An attacker with local access to a multi-user system can exploit this by simply having the swhkd daemon running. The daemon will intercept all keyboard input, including that of other users, without requiring any special privileges beyond being able to start the daemon (which typically requires root or setuid). [1]
Impact
The attacker can capture keystrokes of other users, leading to information disclosure (e.g., passwords, confidential data). Additionally, the legitimate user's keyboard input may be consumed by the daemon, resulting in denial of service for keyboard functionality. [1][2]
Mitigation
As of the latest release (1.2.1), CVE-2022-27817 remains unfixed because a proper solution requires a complete rewrite to handle seat isolation. The maintainer notes that for single-user (single-seat) systems, the vulnerability is not exploitable. No workaround is available; users on multi-user systems should avoid running swhkd or restrict its use to single-user environments. [4]
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Simple-Wayland-HotKey-Daemoncrates.io | <= 1.1.5 | — |
Affected products
2- SWHKD/SWHKDdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-h5wh-7h2j-h999ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-27817ghsaADVISORY
- www.openwall.com/lists/oss-security/2022/04/14/1ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.