Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13566: Double Free in jarun nnn

0
Medium
VulnerabilityCVE-2025-13566cvecve-2025-13566
Published: Sun Nov 23 2025 (11/23/2025, 19:32:07 UTC)
Source: CVE Database V5
Vendor/Project: jarun
Product: nnn

Description

A security vulnerability has been detected in jarun nnn up to 5.1. The impacted element is the function show_content_in_floating_window/run_cmd_as_plugin of the file nnn/src/nnn.c. The manipulation leads to double free. An attack has to be approached locally. The identifier of the patch is 2f07ccdf21e705377862e5f9dfa31e1694979ac7. It is suggested to install a patch to address this issue.

AI-Powered Analysis

AILast updated: 11/30/2025, 20:07:36 UTC

Technical Analysis

CVE-2025-13566 is a vulnerability identified in the 'nnn' terminal file manager, versions 5.0 and 5.1. The issue arises from a double free condition in the functions show_content_in_floating_window and run_cmd_as_plugin within the source file nnn/src/nnn.c. A double free occurs when the program attempts to free the same memory location twice, leading to memory corruption, which can cause crashes or potentially be leveraged for arbitrary code execution. However, exploitation requires local access with low privileges and does not require user interaction, limiting the attack vector to local users or processes with some level of access. The vulnerability does not impact confidentiality, integrity, or availability directly but can lead to denial of service or local privilege escalation if combined with other vulnerabilities. The patch identified by commit 2f07ccdf21e705377862e5f9dfa31e1694979ac7 addresses this issue by correcting the memory management logic to prevent the double free. No public exploits have been reported, indicating limited active exploitation. The CVSS 4.8 score reflects a medium severity, considering the local attack vector and the requirement for privileges. The vulnerability is relevant primarily to Linux environments where 'nnn' is used as a lightweight file manager, often favored by developers and system administrators.

Potential Impact

For European organizations, the impact of CVE-2025-13566 is primarily related to potential denial of service or local privilege escalation on systems where 'nnn' is installed and used. Since exploitation requires local access, the threat is higher in environments with multiple users or where untrusted users have shell access. Organizations relying on 'nnn' for file management in development, system administration, or automation tasks could face disruptions if the vulnerability is exploited. While no remote exploitation is possible, insider threats or compromised accounts could leverage this flaw to destabilize systems or escalate privileges. The impact on confidentiality is minimal, but integrity and availability could be affected due to memory corruption. European entities with strong open-source usage, especially in IT, research, and development sectors, may be more exposed. The absence of known exploits reduces immediate risk but does not eliminate the need for timely patching to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2025-13566, European organizations should: 1) Immediately apply the patch identified by commit 2f07ccdf21e705377862e5f9dfa31e1694979ac7 from the official 'nnn' repository or vendor updates. 2) Restrict local access to systems running 'nnn' to trusted users only, minimizing the risk of local exploitation. 3) Implement strict user privilege management and monitor for unusual local activity that could indicate exploitation attempts. 4) Employ memory protection mechanisms such as Address Space Layout Randomization (ASLR) and stack canaries to reduce exploitation success. 5) Regularly audit installed software versions and remove or replace unused or unnecessary tools like 'nnn' in sensitive environments. 6) Educate users about the risks of running untrusted commands or plugins within 'nnn' to avoid triggering the vulnerable code paths. 7) Integrate vulnerability scanning and patch management processes to ensure timely updates of open-source tools.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T17:37:52.818Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6923643de9cdbb117d0d9be2

Added to database: 11/23/2025, 7:45:01 PM

Last enriched: 11/30/2025, 8:07:36 PM

Last updated: 1/10/2026, 10:16:11 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats