Description
NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the Low IL temp directory when executing as SYSTEM, allowing local attackers to gain privileges (if they can cause my_GetTempFileName to return 0, as shown in the references).
Published: 2026-04-24
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Patch Now
AI Analysis

Impact

NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 contains a flaw where the runtime may use a low integrity level temporary directory when running under the SYSTEM account. If a malicious local user can force the internal function my_GetTempFileName to return zero, the installer can write files to that low IL directory and then execute them with SYSTEM privileges. This vulnerability is a classic path bypass weakness (CWE-427) that directly permits escalation of local privileges, potentially allowing an attacker to modify the system or install persistent malware. The impact is significant because SYSTEM access provides full control over the OS, enabling complete compromise of the affected machine.

Affected Systems

The flaw affects Nullsoft’s Nullsoft Scriptable Install System from any vendor that distributes the OS‑level installer, including Windows clients and servers. The affected releases are NSIS 3.06.1 through 3.11.2; versions 3.12 and later incorporate the fix. No additional vendor or product variants are listed. If your environment uses NSIS 3.06.1‑3.11.x, you are potentially vulnerable.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity, with the EPSS score less than 1% suggesting a low probability of attackers actively exploiting this issue at present. The flaw is not listed in CISA’s KEV catalog, further indicating limited known exploitation. The vulnerability requires a local attacker to trigger a zero return from my_GetTempFileName, which implies some user privilege is necessary but could be achieved from a compromised user account. The attack path is local, leveraging the installer's behavior under SYSTEM and the low IL temp directory, and does not require network reachability or external code injection.

Generated by OpenCVE AI on April 28, 2026 at 05:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to NSIS version 3.12 or later, which removes the low-IL temp directory usage bug.
  • If an upgrade is not immediately possible, ensure that the user account performing the installation does not have privileges that can manipulate or bypass the temp file creation (e.g., restrict write access to the temp directory and validate the return value of my_GetTempFileName).
  • Continuously monitor for any exploitation attempts by reviewing installer logs and watching for unexpected files created in low‑IL temp directories; quarantine any anomalous activity immediately.

Generated by OpenCVE AI on April 28, 2026 at 05:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 06:00:00 +0000

Type Values Removed Values Added
Title Low IL Temp Directory Path Exposure Allows Local Privilege Escalation

Sat, 25 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the Low IL temp directory when executing as SYSTEM, allowing local attackers to gain privileges (if they can cause my_GetTempFileName to return 0, as shown in the references).
First Time appeared Nullsoft
Nullsoft nullsoft Scriptable Install System
Weaknesses CWE-427
CPEs cpe:2.3:a:nullsoft:nullsoft_scriptable_install_system:*:*:*:*:*:*:*:*
Vendors & Products Nullsoft
Nullsoft nullsoft Scriptable Install System
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Nullsoft Nullsoft Scriptable Install System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-25T19:33:05.317Z

Reserved: 2026-04-24T21:20:35.145Z

Link: CVE-2026-42171

cve-icon Vulnrichment

Updated: 2026-04-25T01:56:33.733Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T22:16:01.540

Modified: 2026-05-18T14:33:16.243

Link: CVE-2026-42171

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:45:23Z

Weaknesses