Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-30801: CWE-1392: Use of Default Credentials in qBittorrent qBittorrent client

0
Critical
VulnerabilityCVE-2023-30801cvecve-2023-30801cwe-1392
Published: Tue Oct 10 2023 (10/10/2023, 13:46:46 UTC)
Source: CVE Database V5
Vendor/Project: qBittorrent
Product: qBittorrent client

Description

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

AI-Powered Analysis

AILast updated: 11/21/2025, 16:28:15 UTC

Technical Analysis

CVE-2023-30801 is a critical security vulnerability affecting all versions of the qBittorrent client through 4.5.5. The core issue stems from the use of default credentials for the web user interface (web UI), which administrators are not required to change upon enabling this feature. This design flaw allows remote attackers to authenticate using these default credentials without any prior knowledge or interaction. Once authenticated, attackers can leverage the 'external program' feature within the web UI to execute arbitrary operating system commands on the host machine. This capability effectively grants full control over the affected system, compromising confidentiality, integrity, and availability. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical nature with network attack vector, no required privileges, no user interaction, and full impact on all security properties. Despite the severity, as of version 4.5.5, no official patch or fix has been released. The vulnerability was reportedly exploited in the wild in March 2023, indicating active threat actors are leveraging this flaw. The lack of forced credential change and the powerful command execution capability make this vulnerability particularly dangerous. Organizations running qBittorrent with the web UI enabled are at risk of remote compromise, data theft, or further lateral movement within their networks.

Potential Impact

For European organizations, the impact of CVE-2023-30801 is substantial. The ability for an unauthenticated remote attacker to execute arbitrary OS commands can lead to full system compromise, data exfiltration, ransomware deployment, or use of the compromised host as a pivot point for broader network attacks. Organizations using qBittorrent clients with the web UI enabled, especially in corporate or sensitive environments, face risks to critical infrastructure and intellectual property. The vulnerability threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized changes, and availability by potentially disrupting services or deleting data. Given the ease of exploitation and the lack of required user interaction, attackers can rapidly compromise multiple systems. This is particularly concerning for sectors such as finance, government, and critical infrastructure within Europe, where data protection regulations like GDPR impose strict requirements on data security and breach notification. Failure to mitigate this vulnerability could result in regulatory penalties, reputational damage, and operational disruptions.

Mitigation Recommendations

To mitigate CVE-2023-30801 effectively, European organizations should take immediate and specific actions beyond generic advice: 1) Disable the qBittorrent web user interface if it is not essential to operations, thereby eliminating the attack surface. 2) If the web UI is required, restrict access strictly via network-level controls such as firewalls or VPNs to trusted IP addresses only. 3) Monitor network traffic and system logs for any unauthorized access attempts or unusual command executions related to qBittorrent processes. 4) Implement host-based intrusion detection systems (HIDS) to detect anomalous behavior indicative of exploitation. 5) Educate users and administrators about the risks of default credentials and enforce policies to change any default or weak passwords immediately. 6) Consider deploying application whitelisting to prevent unauthorized execution of commands spawned by the qBittorrent client. 7) Stay informed on vendor updates and apply patches promptly once available. 8) As a longer-term measure, evaluate alternative torrent clients with better security postures for organizational use. These targeted steps will reduce exposure and help detect or prevent exploitation in the absence of an official patch.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2023-04-18T10:31:45.962Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69209279b50ca2a0e366a94c

Added to database: 11/21/2025, 4:25:29 PM

Last enriched: 11/21/2025, 4:28:15 PM

Last updated: 11/21/2025, 6:40:40 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats