CVE-2023-49102
NixOS vulnerability analysis and mitigation

Overview

NZBGet 21.1 allows authenticated remote code execution through unarchive programs (7za and unrar) that preserve executable file permissions. The vulnerability (CVE-2023-49102) was discovered in November 2023 and affects the unmaintained NZBGet software. An attacker with Control capability can execute arbitrary code by setting the value of SevenZipCommand or UnrarCmd (NVD, MITRE).

Technical details

The vulnerability exists because both supported unarchive programs (7za and unrar) preserve file permissions when extracting archives. This means that if an archive contains a shell script with execute permissions, those permissions are maintained after extraction. An attacker can exploit this by uploading a malicious executable file and then modifying the SevenZipCommand or UnrarCmd settings to point to the extracted executable. The vulnerability has a CVSS v3.1 base score of 8.8 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) (SEC_MARIDE).

Impact

Successful exploitation allows an authenticated attacker with Control user privileges to execute arbitrary code on the system running NZBGet. This could lead to complete system compromise within the context of the NZBGet application (NVD).

Mitigation and workarounds

Since this vulnerability affects an unmaintained version of the software, the primary mitigation is to migrate to an alternative, maintained solution. For those who must continue using NZBGet, it is recommended to change credentials for the Control user and evaluate if the instance needs to be exposed to the internet (SEC_MARIDE).

Community reactions

The discovery of this vulnerability serves as a reminder of the risks associated with using unmaintained software. Over 1,500 publicly available instances were found to be potentially vulnerable at the time of disclosure (SEC_MARIDE).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-69264CRITICAL9.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69263HIGH8.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69262HIGH7.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-20807MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026
CVE-2026-21885MEDIUM6.5
  • NixOSNixOS
  • miniflux
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management