CVE-2026-25740

N/A Unknown

📋 TL;DR

This vulnerability in captive-browser allows any system user to execute arbitrary commands with CAP_NET_RAW capability, enabling them to bind to privileged ports and spoof localhost traffic from privileged services. It affects NixOS systems with programs.captive-browser enabled in versions 25.05 and earlier.

💻 Affected Systems

Products:
  • captive-browser (NixOS package)
Versions: 25.05 and earlier
Operating Systems: NixOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when programs.captive-browser is explicitly enabled in configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept or manipulate traffic from privileged services running on localhost, potentially leading to credential theft, service disruption, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation allowing unauthorized users to perform network operations typically restricted to privileged processes, potentially enabling traffic monitoring or service impersonation.

🟢

If Mitigated

Limited impact if proper access controls and network segmentation are in place, though local users could still abuse network capabilities.

🌐 Internet-Facing: LOW - This is primarily a local privilege escalation vulnerability requiring local system access.
🏢 Internal Only: HIGH - Any local user on affected systems can exploit this vulnerability to gain elevated network capabilities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.11 and 26.05

Vendor Advisory: https://github.com/NixOS/nixpkgs/security/advisories/GHSA-wc3r-c66x-8xmc

Restart Required: Yes

Instructions:

1. Update NixOS to version 25.11 or 26.05. 2. Rebuild system configuration. 3. Reboot system to apply changes.

🔧 Temporary Workarounds

Disable captive-browser

linux

Temporarily disable the vulnerable component until patching is possible

nixos-rebuild switch --option programs.captive-browser.enable false

🧯 If You Can't Patch

  • Restrict local user access to affected systems
  • Implement network monitoring for unusual localhost traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check if programs.captive-browser is enabled and NixOS version is 25.05 or earlier

Check Version:

nixos-version

Verify Fix Applied:

Verify NixOS version is 25.11 or 26.05 and captive-browser functionality works without granting CAP_NET_RAW to users

📡 Detection & Monitoring

Log Indicators:

  • Unusual processes running with CAP_NET_RAW capability
  • Unexpected network binds to privileged ports

Network Indicators:

  • Suspicious localhost traffic patterns
  • Unexpected services listening on privileged ports

SIEM Query:

process where capability contains 'cap_net_raw' and user != 'root'

🔗 References

📤 Share & Export