CVE-2026-5053
Received Received - Intake
Arbitrary File Deletion in NoMachine via Environment Variable Flaw

Publication date: 2026-04-11

Last updated on: 2026-04-15

Assigner: Zero Day Initiative

Description
NoMachine External Control of File Path Arbitrary File Deletion Vulnerability. This vulnerability allows local attackers to delete arbitrary files on affected installations of NoMachine. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of environment variables. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of root. Was ZDI-CAN-28644.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-11
Last Modified
2026-04-15
Generated
2026-05-06
AI Q&A
2026-04-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nomachine nomachine to 9.4.14 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-73 The product allows user input to control or influence paths or file names that are used in filesystem operations.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5053 is a vulnerability in NoMachine products that allows local attackers to delete arbitrary files on affected systems.

The flaw exists because the software does not properly validate user-supplied file paths within environment variables before using them in file operations.

An attacker who can execute low-privileged code on the target system can exploit this vulnerability to delete files with root-level privileges.


How can this vulnerability impact me? :

This vulnerability can have a significant impact by allowing an attacker to delete important files on the system with root privileges.

Such arbitrary file deletion can compromise system integrity and availability, potentially leading to system instability or denial of service.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that only trusted users have the ability to execute low-privileged code on the system, as exploitation requires such access.

Additionally, monitor and restrict environment variables that influence file path operations to prevent manipulation by untrusted users.

Applying any available patches or updates from NoMachine addressing this vulnerability is also recommended.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart