CVE-2025-13566: Double Free in jarun nnn
A security vulnerability has been detected in jarun nnn up to 5.1. The impacted element is the function show_content_in_floating_window/run_cmd_as_plugin of the file nnn/src/nnn.c. The manipulation leads to double free. An attack has to be approached locally. The identifier of the patch is 2f07ccdf21e705377862e5f9dfa31e1694979ac7. It is suggested to install a patch to address this issue.
AI Analysis
Technical Summary
CVE-2025-13566 is a vulnerability identified in the 'nnn' terminal file manager, versions 5.0 and 5.1. The issue arises from a double free condition in the functions show_content_in_floating_window and run_cmd_as_plugin within the source file nnn/src/nnn.c. A double free occurs when the program attempts to free the same memory location twice, leading to memory corruption, which can cause crashes or potentially be leveraged for arbitrary code execution. However, exploitation requires local access with low privileges and does not require user interaction, limiting the attack vector to local users or processes with some level of access. The vulnerability does not impact confidentiality, integrity, or availability directly but can lead to denial of service or local privilege escalation if combined with other vulnerabilities. The patch identified by commit 2f07ccdf21e705377862e5f9dfa31e1694979ac7 addresses this issue by correcting the memory management logic to prevent the double free. No public exploits have been reported, indicating limited active exploitation. The CVSS 4.8 score reflects a medium severity, considering the local attack vector and the requirement for privileges. The vulnerability is relevant primarily to Linux environments where 'nnn' is used as a lightweight file manager, often favored by developers and system administrators.
Potential Impact
For European organizations, the impact of CVE-2025-13566 is primarily related to potential denial of service or local privilege escalation on systems where 'nnn' is installed and used. Since exploitation requires local access, the threat is higher in environments with multiple users or where untrusted users have shell access. Organizations relying on 'nnn' for file management in development, system administration, or automation tasks could face disruptions if the vulnerability is exploited. While no remote exploitation is possible, insider threats or compromised accounts could leverage this flaw to destabilize systems or escalate privileges. The impact on confidentiality is minimal, but integrity and availability could be affected due to memory corruption. European entities with strong open-source usage, especially in IT, research, and development sectors, may be more exposed. The absence of known exploits reduces immediate risk but does not eliminate the need for timely patching to prevent future attacks.
Mitigation Recommendations
To mitigate CVE-2025-13566, European organizations should: 1) Immediately apply the patch identified by commit 2f07ccdf21e705377862e5f9dfa31e1694979ac7 from the official 'nnn' repository or vendor updates. 2) Restrict local access to systems running 'nnn' to trusted users only, minimizing the risk of local exploitation. 3) Implement strict user privilege management and monitor for unusual local activity that could indicate exploitation attempts. 4) Employ memory protection mechanisms such as Address Space Layout Randomization (ASLR) and stack canaries to reduce exploitation success. 5) Regularly audit installed software versions and remove or replace unused or unnecessary tools like 'nnn' in sensitive environments. 6) Educate users about the risks of running untrusted commands or plugins within 'nnn' to avoid triggering the vulnerable code paths. 7) Integrate vulnerability scanning and patch management processes to ensure timely updates of open-source tools.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland
CVE-2025-13566: Double Free in jarun nnn
Description
A security vulnerability has been detected in jarun nnn up to 5.1. The impacted element is the function show_content_in_floating_window/run_cmd_as_plugin of the file nnn/src/nnn.c. The manipulation leads to double free. An attack has to be approached locally. The identifier of the patch is 2f07ccdf21e705377862e5f9dfa31e1694979ac7. It is suggested to install a patch to address this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-13566 is a vulnerability identified in the 'nnn' terminal file manager, versions 5.0 and 5.1. The issue arises from a double free condition in the functions show_content_in_floating_window and run_cmd_as_plugin within the source file nnn/src/nnn.c. A double free occurs when the program attempts to free the same memory location twice, leading to memory corruption, which can cause crashes or potentially be leveraged for arbitrary code execution. However, exploitation requires local access with low privileges and does not require user interaction, limiting the attack vector to local users or processes with some level of access. The vulnerability does not impact confidentiality, integrity, or availability directly but can lead to denial of service or local privilege escalation if combined with other vulnerabilities. The patch identified by commit 2f07ccdf21e705377862e5f9dfa31e1694979ac7 addresses this issue by correcting the memory management logic to prevent the double free. No public exploits have been reported, indicating limited active exploitation. The CVSS 4.8 score reflects a medium severity, considering the local attack vector and the requirement for privileges. The vulnerability is relevant primarily to Linux environments where 'nnn' is used as a lightweight file manager, often favored by developers and system administrators.
Potential Impact
For European organizations, the impact of CVE-2025-13566 is primarily related to potential denial of service or local privilege escalation on systems where 'nnn' is installed and used. Since exploitation requires local access, the threat is higher in environments with multiple users or where untrusted users have shell access. Organizations relying on 'nnn' for file management in development, system administration, or automation tasks could face disruptions if the vulnerability is exploited. While no remote exploitation is possible, insider threats or compromised accounts could leverage this flaw to destabilize systems or escalate privileges. The impact on confidentiality is minimal, but integrity and availability could be affected due to memory corruption. European entities with strong open-source usage, especially in IT, research, and development sectors, may be more exposed. The absence of known exploits reduces immediate risk but does not eliminate the need for timely patching to prevent future attacks.
Mitigation Recommendations
To mitigate CVE-2025-13566, European organizations should: 1) Immediately apply the patch identified by commit 2f07ccdf21e705377862e5f9dfa31e1694979ac7 from the official 'nnn' repository or vendor updates. 2) Restrict local access to systems running 'nnn' to trusted users only, minimizing the risk of local exploitation. 3) Implement strict user privilege management and monitor for unusual local activity that could indicate exploitation attempts. 4) Employ memory protection mechanisms such as Address Space Layout Randomization (ASLR) and stack canaries to reduce exploitation success. 5) Regularly audit installed software versions and remove or replace unused or unnecessary tools like 'nnn' in sensitive environments. 6) Educate users about the risks of running untrusted commands or plugins within 'nnn' to avoid triggering the vulnerable code paths. 7) Integrate vulnerability scanning and patch management processes to ensure timely updates of open-source tools.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T17:37:52.818Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6923643de9cdbb117d0d9be2
Added to database: 11/23/2025, 7:45:01 PM
Last enriched: 11/30/2025, 8:07:36 PM
Last updated: 1/10/2026, 10:16:11 PM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.