Impact
A user can trigger the programs.captive-browser module to run arbitrary commands with the CAP_NET_RAW capability, allowing binding to privileged ports and spoofing localhost traffic. The weakness stems from improper privilege assignment (CWE-250) and can compromise system networking functions if exploited. The impact is confined to the user’s own session but grants elevated low‑level network control.
Affected Systems
This issue affects NixOS installations using the nixpkgs 25.05 release or earlier that enable the programs.captive-browser module. It is fixed in nixpkgs 25.11 and 26.05.
Risk and Exploitability
The CVSS score is 5.8 and the EPSS score is below 1%, indicating a moderate severity with low exploitation probability. The vulnerability is not listed in the KEV catalog. The likely attack vector is local, requiring an authenticated or otherwise logged‑in user to enable the module or execute commands within the system. No remote trigger is described, so a local privileged user can reach the CAP_NET_RAW capability through this path.
OpenCVE Enrichment