CVE-2026-5053
Arbitrary File Deletion in NoMachine via Environment Variable Flaw
Publication date: 2026-04-11
Last updated on: 2026-04-15
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nomachine | nomachine | to 9.4.14 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-73 | The product allows user input to control or influence paths or file names that are used in filesystem operations. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-5053 is a vulnerability in NoMachine products that allows local attackers to delete arbitrary files on affected systems.
The flaw exists because the software does not properly validate user-supplied file paths within environment variables before using them in file operations.
An attacker who can execute low-privileged code on the target system can exploit this vulnerability to delete files with root-level privileges.
How can this vulnerability impact me? :
This vulnerability can have a significant impact by allowing an attacker to delete important files on the system with root privileges.
Such arbitrary file deletion can compromise system integrity and availability, potentially leading to system instability or denial of service.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that only trusted users have the ability to execute low-privileged code on the system, as exploitation requires such access.
Additionally, monitor and restrict environment variables that influence file path operations to prevent manipulation by untrusted users.
Applying any available patches or updates from NoMachine addressing this vulnerability is also recommended.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.