CVE-2026-5054
Received Received - Intake
Local Privilege Escalation in NoMachine via File Path Manipulation

Publication date: 2026-04-11

Last updated on: 2026-04-15

Assigner: Zero Day Initiative

Description
NoMachine External Control of File Path Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NoMachine. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of command line parameters. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-28630.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-11
Last Modified
2026-04-15
Generated
2026-05-07
AI Q&A
2026-04-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nomachine nomachine to 9.4.14 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-73 The product allows user input to control or influence paths or file names that are used in filesystem operations.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

This vulnerability requires local code execution to be exploited, so immediate mitigation steps include restricting local user access and privileges to prevent untrusted users from executing code.

Additionally, ensure that your NoMachine installation is updated to the latest version where this vulnerability is patched.


Can you explain this vulnerability to me?

CVE-2026-5054 is a local privilege escalation vulnerability in NoMachine software. It occurs because the software does not properly validate user-supplied file paths in command line parameters. This flaw allows an attacker who already has the ability to execute low-privileged code on the target system to manipulate file operations.

By exploiting this vulnerability, the attacker can escalate their privileges and execute arbitrary code with root-level access on the affected system.


How can this vulnerability impact me? :

This vulnerability can have a significant impact because it allows an attacker with limited local access to escalate their privileges to root level. This means the attacker can gain full control over the affected system, potentially leading to unauthorized access, data manipulation, or disruption of services.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows local attackers to escalate privileges to root level on affected NoMachine installations by exploiting improper validation of user-supplied file paths. Such unauthorized privilege escalation can lead to unauthorized access, modification, or disclosure of sensitive data.

Consequently, if exploited in environments subject to regulations like GDPR or HIPAA, this vulnerability could result in non-compliance due to potential breaches of data confidentiality, integrity, and availability requirements mandated by these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart