Description
NoMachine External Control of File Path Arbitrary File Deletion Vulnerability. This vulnerability allows local attackers to delete arbitrary files on affected installations of NoMachine. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the handling of environment variables. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of root. Was ZDI-CAN-28644.
Published: 2026-04-11
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file deletion
Action: Patch Immediately
AI Analysis

Impact

This vulnerability allows local attackers to delete arbitrary files on NoMachine installations. The flaw lies in the handling of environment variables, where user-supplied paths are not properly validated before file operations. An attacker must first gain low‑privileged code execution on the target system to exploit the flaw, after which they can delete files with the privileges of that session, potentially including root‑level files.

Affected Systems

All versions of NoMachine software are potentially affected as no specific affected versions were disclosed. The vulnerability applies to the NoMachine product, used for remote desktop access.

Risk and Exploitability

The CVSS base score is 7.1, indicating high severity. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog. Because the flaw requires low‑privileged code execution, the attack is primarily local. An attacker who manages to execute code can delete files with the same privileges, enabling disruption or further privilege escalation. The lack of a public exploit reduces immediate threat, but organizations should still treat it as a high‑risk local vulnerability.

Generated by OpenCVE AI on April 11, 2026 at 02:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • If a security update or patch is available from NoMachine, apply it immediately.
  • If a patch is not yet released, restrict or monitor environment variables used by NoMachine to prevent path manipulation.
  • Deploy least privilege principles to limit access of applications that can modify environment variables.
  • Regularly check NoMachine’s advisories and keep installations updated.

Generated by OpenCVE AI on April 11, 2026 at 02:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nomachine:nomachine:*:*:*:*:*:*:*:*

Mon, 13 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Nomachine
Nomachine nomachine
Vendors & Products Nomachine
Nomachine nomachine

Sat, 11 Apr 2026 01:00:00 +0000

Type Values Removed Values Added
Description NoMachine External Control of File Path Arbitrary File Deletion Vulnerability. This vulnerability allows local attackers to delete arbitrary files on affected installations of NoMachine. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of environment variables. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of root. Was ZDI-CAN-28644.
Title NoMachine External Control of File Path Arbitrary File Deletion Vulnerability
Weaknesses CWE-73
References
Metrics cvssV3_0

{'score': 7.1, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Nomachine Nomachine
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-04-13T16:18:43.447Z

Reserved: 2026-03-27T18:05:32.535Z

Link: CVE-2026-5053

cve-icon Vulnrichment

Updated: 2026-04-13T16:18:39.918Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-11T01:16:17.757

Modified: 2026-04-15T18:43:05.060

Link: CVE-2026-5053

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:57:07Z

Weaknesses