{"id":"CVE-2023-23596","details":"jc21 NGINX Proxy Manager through 2.9.19 allows OS command injection. When creating an access list, the backend builds an htpasswd file with crafted username and/or password input that is concatenated without any validation, and is directly passed to the exec command, potentially allowing an authenticated attacker to execute arbitrary commands on the system. NOTE: this is not part of any NGINX software shipped by F5.","modified":"2026-03-15T22:44:29.764551Z","published":"2023-01-20T08:15:12.670Z","references":[{"type":"EVIDENCE","url":"https://github.com/NginxProxyManager/nginx-proxy-manager/blob/4f10d129c20cc82494b95cc94b97f859dbd4b54d/backend/internal/access-list.js#L510"},{"type":"EVIDENCE","url":"https://advisory.dw1.io/57"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jc21/nginx-proxy-manager","events":[{"introduced":"0"},{"last_affected":"5920b0cf5e8ef2f0d866f0c971f72d8f81e97c00"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.9.19"}]}}],"versions":["1.0.1","1.1.1","1.1.2","2.0.0","2.0.10","2.0.11","2.0.12","2.0.13","2.0.14","2.0.2","2.0.3","2.0.4","2.0.5","2.0.6","2.0.7","2.0.8","2.0.9","v2.0.0","v2.1.0","v2.1.1","v2.1.2","v2.2.0","v2.2.1","v2.2.2","v2.2.3","v2.2.4","v2.3.0","v2.3.1","v2.4.0","v2.5.0","v2.6.0","v2.6.1","v2.6.2","v2.7.0","v2.7.1","v2.7.2","v2.7.3","v2.8.0","v2.8.1","v2.9.0","v2.9.1","v2.9.10","v2.9.11","v2.9.12","v2.9.13","v2.9.14","v2.9.15","v2.9.16","v2.9.17","v2.9.18","v2.9.19","v2.9.2","v2.9.3","v2.9.4","v2.9.5","v2.9.6","v2.9.7","v2.9.8","v2.9.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-23596.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}