CVE-2025-13566

3.3 LOW

📋 TL;DR

A double-free vulnerability exists in the nnn file manager up to version 5.1, specifically in the show_content_in_floating_window/run_cmd_as_plugin function. This allows local attackers to potentially execute arbitrary code or cause denial of service. Only users running nnn on their local systems are affected.

💻 Affected Systems

Products:
  • jarun nnn file manager
Versions: All versions up to 5.1
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where nnn is installed and used. The vulnerability requires local access to trigger.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise via arbitrary code execution.

🟠

Likely Case

Application crash (denial of service) or limited memory corruption.

🟢

If Mitigated

No impact with proper patching or workarounds in place.

🌐 Internet-Facing: LOW - This is a local-only vulnerability requiring user interaction on the affected system.
🏢 Internal Only: MEDIUM - While local-only, it could be exploited by malicious insiders or through other local attack vectors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and specific user interaction with nnn's floating window functionality. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after commit 2f07ccdf21e705377862e5f9dfa31e1694979ac7

Vendor Advisory: https://github.com/jarun/nnn/commit/2f07ccdf21e705377862e5f9dfa31e1694979ac7

Restart Required: No

Instructions:

1. Update nnn to the latest version from the official repository. 2. For source installations: git pull from https://github.com/jarun/nnn and rebuild. 3. For package managers: Use your distribution's package manager to update nnn.

🔧 Temporary Workarounds

Disable floating window functionality

linux

Avoid using the floating window feature that triggers the vulnerable code path

Avoid using 'F' key or similar floating window triggers in nnn

🧯 If You Can't Patch

  • Restrict local user access to systems running vulnerable nnn versions
  • Implement strict privilege separation and run nnn with minimal privileges

🔍 How to Verify

Check if Vulnerable:

Check nnn version with 'nnn -v' and verify if it's 5.1 or earlier

Check Version:

nnn -v

Verify Fix Applied:

Verify nnn version is newer than 5.1 or check if commit 2f07ccdf21e705377862e5f9dfa31e1694979ac7 is present in the source

📡 Detection & Monitoring

Log Indicators:

  • Segmentation faults or abnormal termination of nnn process
  • Memory corruption errors in system logs

Network Indicators:

  • None - this is a local-only vulnerability

SIEM Query:

Process termination events for nnn with exit code indicating segmentation fault

🔗 References

📤 Share & Export