Description
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Published: 2026-04-28
Score: n/a
EPSS: n/a
KEV: No
Impact: Local Privilege Abuse through Directory Permission Mis‑configuration
Action: Apply Patch
AI Analysis

Impact

GNU nano creates a user‑specific directory called ~/.local with overly permissive permissions when it does not yet exist. The editor explicitly requests mode 0777 for this directory during the first XDG data storage operation, making it world‑writable in environments that do not enforce a restrictive umask. A local attacker who can run nano on the same system can exploit a window between the directory’s creation and the subsequent creation of more restrictive subdirectories. By writing attacker‑controlled files into the XDG hierarchy, the attacker can potentially alter configuration or execution environment of applications that read files from ~/.local, leading to privilege abuse or local compromise. The weakness is a mis‑configuration that results in improper access control during directory creation (CWE‑732).

Affected Systems

The vulnerability affects the GNU nano text editor. All releases prior to nano 9.0 create the ~/.local directory with world‑writable permissions. Systems that rely on nano for user interaction and that use a relaxed umask, such as container environments, CI/CD runners, embedded devices, or user shells set to umask 000, are at risk. The flaw is mitigated in nano 9.0 and later where the default directory mode is restricted.

Risk and Exploitability

The CVSS score of 2.1 indicates low severity, and the EPSS score was not reported. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires local access to a process that can run nano; the attacker must also be able to observe or influence the race between the creation of ~/.local and the creation of subdirectories. Because of this race condition and the local nature of the flaw, the likelihood of exploitation is low, but in environments with a zero or very permissive umask the risk is higher. The attacker can use the malicious file to influence programs that read from the XDG directory hierarchy, potentially enabling local privilege escalation or denial of service of user applications.

Generated by OpenCVE AI on April 28, 2026 at 19:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the GNU nano package to version 9.0 or later, where the .local directory is created with restrictive permissions.
  • If an upgrade is not yet possible, configure a restrictive umask (at least 022) before launching nano so that ~/.local is not created with world‑writable mode.
  • After installing nano, ensure that any existing ~/.local directories on affected systems have permissions set to 0755 or more restrictive and remove any world‑writable files that may have been created by the vulnerability.

Generated by OpenCVE AI on April 28, 2026 at 19:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References

No reference.

History

Wed, 29 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-732
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X'}


Wed, 29 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Description GNU nano creates the user’s ~/.local directory with overly permissive permissions when the directory does not exist yet. On first use of features requiring Cross-Desktop Group (XDG) data storage, nano explicitly requests directory mode 0777, making the directory world‑writable in environments where the process umask does not sufficiently restrict permissions. In systems with a relaxed or zero umask, such as container environments, CI/CD runners, embedded systems, or user shells configured with umask 000, this results in ~/.local being created as world‑writable. A local attacker can exploit a race window between nano’s creation of ~/.local and its subsequent creation of more restrictive subdirectories to write attacker‑controlled files into the victim’s XDG directory hierarchy. This problem was fixed in nano version 9.0 This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Title Insecure Directory Permissions in GNU nano Leading to Privilege Abuse
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}

cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X'}


Tue, 28 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Gnu
Gnu nano
Vendors & Products Gnu
Gnu nano

Tue, 28 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description GNU nano creates the user’s ~/.local directory with overly permissive permissions when the directory does not exist yet. On first use of features requiring Cross-Desktop Group (XDG) data storage, nano explicitly requests directory mode 0777, making the directory world‑writable in environments where the process umask does not sufficiently restrict permissions. In systems with a relaxed or zero umask, such as container environments, CI/CD runners, embedded systems, or user shells configured with umask 000, this results in ~/.local being created as world‑writable. A local attacker can exploit a race window between nano’s creation of ~/.local and its subsequent creation of more restrictive subdirectories to write attacker‑controlled files into the victim’s XDG directory hierarchy. This problem was fixed in nano version 9.0
Title Insecure Directory Permissions in GNU nano Leading to Privilege Abuse
Weaknesses CWE-732
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: REJECTED

Assigner: CERT-PL

Published:

Updated: 2026-04-29T07:17:27.349Z

Reserved: 2026-04-14T09:44:32.553Z

Link: CVE-2026-40556

cve-icon Vulnrichment

Updated:

cve-icon NVD

Status : Rejected

Published: 2026-04-28T15:16:30.150

Modified: 2026-04-29T08:16:17.750

Link: CVE-2026-40556

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:15:25Z

Weaknesses

No weakness.