CVE-2026-42171
Nullsoft · NSIS (Nullsoft Scriptable Install System)
The NSIS (Nullsoft Scriptable Install System) 3 is affected by a high-severity vulnerability that could be leveraged by attackers during software installation.
Executive summary
A high-severity vulnerability in the NSIS 3 installer framework could allow for malicious code execution during the software installation process.
Vulnerability
NSIS is a widely used tool for creating Windows installers. This vulnerability, with a CVSS score of 7.8, likely involves insecure handling of installation scripts or temporary files, potentially allowing an attacker to execute arbitrary code with the same privileges as the installer process.
Business impact
A CVSS score of 7.8 poses a significant threat, as installers often run with administrative privileges. Successful exploitation could lead to full system compromise during the installation of legitimate software that happens to use the vulnerable NSIS version.
Remediation
Immediate Action: Update to the latest version of NSIS and ensure that all software packages distributed within the organization are rebuilt using the patched installer.
Proactive Monitoring: Monitor for unusual file creation or process execution during the software installation phase on enterprise endpoints.
Compensating Controls: Use application whitelisting and ensure that only signed installers from reputable vendors are allowed to execute on end-user machines.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Security teams must coordinate with development and IT operations to identify software packages using NSIS 3 and initiate updates. Standardizing on secure installer versions is critical to protecting endpoints from compromise.