Description
NoMachine External Control of File Path Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NoMachine. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the handling of command line parameters. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-28630.
Published: 2026-04-11
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Patch Now
AI Analysis

Impact

This vulnerability arises from insufficient validation of user‑supplied file paths supplied via command line parameters. An attacker with the ability to run low‑privileged code on the target host can craft a malicious path that the NoMachine application will use in file operations, allowing the attacker to gain elevated system privileges or execute arbitrary code in a root context. The flaw is a direct example of uncontrolled path traversal, classified under CWE‑73, and permits a local attacker to compromise the confidentiality, integrity, and availability of the affected system. The attack does not rely on network‑level access and requires local code execution as a prerequisite.

Affected Systems

The affected vendor is NoMachine, product NoMachine. No specific affected version information is supplied in the CVE record, so any installation that has not applied the vendor’s patch may be vulnerable.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity vulnerability. EPSS information is unavailable, and the vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog, suggesting limited or unknown exploitation in the wild. The likely attack vector is local, with the attacker needing to already execute non‑privileged code on the host. If such code execution is possible, the privilege escalation path is straightforward, making this a serious threat for any system where local users could trigger the vulnerable command line logic.

Generated by OpenCVE AI on April 11, 2026 at 02:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the most recent NoMachine patch or update as released by the vendor.
  • Verify that the installed NoMachine version incorporates the fix for CVE‑2026‑5054.
  • If no patch is available, limit local users from running NoMachine with elevated privileges and monitor file operations for abnormal paths.
  • Consult the ZeroDay Initiative advisory (https://www.zerodayinitiative.com/advisories/ZDI-26-248/) for additional guidance and patch release notes.

Generated by OpenCVE AI on April 11, 2026 at 02:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nomachine:nomachine:*:*:*:*:*:*:*:*

Mon, 13 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Nomachine
Nomachine nomachine
Vendors & Products Nomachine
Nomachine nomachine

Sat, 11 Apr 2026 01:00:00 +0000

Type Values Removed Values Added
Description NoMachine External Control of File Path Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NoMachine. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of command line parameters. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-28630.
Title NoMachine External Control of File Path Local Privilege Escalation Vulnerability
Weaknesses CWE-73
References
Metrics cvssV3_0

{'score': 7.8, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Nomachine Nomachine
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-04-14T03:55:46.803Z

Reserved: 2026-03-27T18:05:48.551Z

Link: CVE-2026-5054

cve-icon Vulnrichment

Updated: 2026-04-13T16:18:06.545Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-11T01:16:17.890

Modified: 2026-04-15T18:42:24.013

Link: CVE-2026-5054

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:57:06Z

Weaknesses