CVE-2023-30801: CWE-1392: Use of Default Credentials in qBittorrent qBittorrent client
All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.
AI Analysis
Technical Summary
CVE-2023-30801 is a critical security vulnerability affecting all versions of the qBittorrent client through 4.5.5. The core issue stems from the use of default credentials for the web user interface (web UI), which administrators are not required to change upon enabling this feature. This design flaw allows remote attackers to authenticate using these default credentials without any prior knowledge or interaction. Once authenticated, attackers can leverage the 'external program' feature within the web UI to execute arbitrary operating system commands on the host machine. This capability effectively grants full control over the affected system, compromising confidentiality, integrity, and availability. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical nature with network attack vector, no required privileges, no user interaction, and full impact on all security properties. Despite the severity, as of version 4.5.5, no official patch or fix has been released. The vulnerability was reportedly exploited in the wild in March 2023, indicating active threat actors are leveraging this flaw. The lack of forced credential change and the powerful command execution capability make this vulnerability particularly dangerous. Organizations running qBittorrent with the web UI enabled are at risk of remote compromise, data theft, or further lateral movement within their networks.
Potential Impact
For European organizations, the impact of CVE-2023-30801 is substantial. The ability for an unauthenticated remote attacker to execute arbitrary OS commands can lead to full system compromise, data exfiltration, ransomware deployment, or use of the compromised host as a pivot point for broader network attacks. Organizations using qBittorrent clients with the web UI enabled, especially in corporate or sensitive environments, face risks to critical infrastructure and intellectual property. The vulnerability threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized changes, and availability by potentially disrupting services or deleting data. Given the ease of exploitation and the lack of required user interaction, attackers can rapidly compromise multiple systems. This is particularly concerning for sectors such as finance, government, and critical infrastructure within Europe, where data protection regulations like GDPR impose strict requirements on data security and breach notification. Failure to mitigate this vulnerability could result in regulatory penalties, reputational damage, and operational disruptions.
Mitigation Recommendations
To mitigate CVE-2023-30801 effectively, European organizations should take immediate and specific actions beyond generic advice: 1) Disable the qBittorrent web user interface if it is not essential to operations, thereby eliminating the attack surface. 2) If the web UI is required, restrict access strictly via network-level controls such as firewalls or VPNs to trusted IP addresses only. 3) Monitor network traffic and system logs for any unauthorized access attempts or unusual command executions related to qBittorrent processes. 4) Implement host-based intrusion detection systems (HIDS) to detect anomalous behavior indicative of exploitation. 5) Educate users and administrators about the risks of default credentials and enforce policies to change any default or weak passwords immediately. 6) Consider deploying application whitelisting to prevent unauthorized execution of commands spawned by the qBittorrent client. 7) Stay informed on vendor updates and apply patches promptly once available. 8) As a longer-term measure, evaluate alternative torrent clients with better security postures for organizational use. These targeted steps will reduce exposure and help detect or prevent exploitation in the absence of an official patch.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2023-30801: CWE-1392: Use of Default Credentials in qBittorrent qBittorrent client
Description
All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.
AI-Powered Analysis
Technical Analysis
CVE-2023-30801 is a critical security vulnerability affecting all versions of the qBittorrent client through 4.5.5. The core issue stems from the use of default credentials for the web user interface (web UI), which administrators are not required to change upon enabling this feature. This design flaw allows remote attackers to authenticate using these default credentials without any prior knowledge or interaction. Once authenticated, attackers can leverage the 'external program' feature within the web UI to execute arbitrary operating system commands on the host machine. This capability effectively grants full control over the affected system, compromising confidentiality, integrity, and availability. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical nature with network attack vector, no required privileges, no user interaction, and full impact on all security properties. Despite the severity, as of version 4.5.5, no official patch or fix has been released. The vulnerability was reportedly exploited in the wild in March 2023, indicating active threat actors are leveraging this flaw. The lack of forced credential change and the powerful command execution capability make this vulnerability particularly dangerous. Organizations running qBittorrent with the web UI enabled are at risk of remote compromise, data theft, or further lateral movement within their networks.
Potential Impact
For European organizations, the impact of CVE-2023-30801 is substantial. The ability for an unauthenticated remote attacker to execute arbitrary OS commands can lead to full system compromise, data exfiltration, ransomware deployment, or use of the compromised host as a pivot point for broader network attacks. Organizations using qBittorrent clients with the web UI enabled, especially in corporate or sensitive environments, face risks to critical infrastructure and intellectual property. The vulnerability threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized changes, and availability by potentially disrupting services or deleting data. Given the ease of exploitation and the lack of required user interaction, attackers can rapidly compromise multiple systems. This is particularly concerning for sectors such as finance, government, and critical infrastructure within Europe, where data protection regulations like GDPR impose strict requirements on data security and breach notification. Failure to mitigate this vulnerability could result in regulatory penalties, reputational damage, and operational disruptions.
Mitigation Recommendations
To mitigate CVE-2023-30801 effectively, European organizations should take immediate and specific actions beyond generic advice: 1) Disable the qBittorrent web user interface if it is not essential to operations, thereby eliminating the attack surface. 2) If the web UI is required, restrict access strictly via network-level controls such as firewalls or VPNs to trusted IP addresses only. 3) Monitor network traffic and system logs for any unauthorized access attempts or unusual command executions related to qBittorrent processes. 4) Implement host-based intrusion detection systems (HIDS) to detect anomalous behavior indicative of exploitation. 5) Educate users and administrators about the risks of default credentials and enforce policies to change any default or weak passwords immediately. 6) Consider deploying application whitelisting to prevent unauthorized execution of commands spawned by the qBittorrent client. 7) Stay informed on vendor updates and apply patches promptly once available. 8) As a longer-term measure, evaluate alternative torrent clients with better security postures for organizational use. These targeted steps will reduce exposure and help detect or prevent exploitation in the absence of an official patch.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2023-04-18T10:31:45.962Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69209279b50ca2a0e366a94c
Added to database: 11/21/2025, 4:25:29 PM
Last enriched: 11/21/2025, 4:28:15 PM
Last updated: 11/21/2025, 6:40:40 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64483: CWE-284: Improper Access Control in wazuh wazuh-dashboard-plugins
MediumCVE-2025-13132: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in The Browser Company of New York Dia
HighCVE-2025-12973: CWE-434 Unrestricted Upload of File with Dangerous Type in oc3dots S2B AI Assistant – ChatBot, ChatGPT, OpenAI, Content & Image Generator
HighCVE-2025-13470: CWE-330 Use of Insufficiently Random Values in Ribose RNP
HighCVE-2023-30800: CWE-787 Out-of-bounds Write in MikroTik RouterOS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.