Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-41179

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Starting in version 1.48.0 and prior to version 1.73.5, the RC endpoint `operations/fsinfo` is exposed without `AuthRequired: true` and accepts attacker-controlled `fs` input. Because `rc.GetFs(...)` supports inline backend definitions, an unauthenticated attacker can instantiate an attacker-controlled backend on demand. For the WebDAV backend, `bearer_token_command` is executed during backend initialization, making single-request unauthenticated local command execution possible on reachable RC deployments without global HTTP authentication. Version 1.73.5 patches the issue.

View on NVD

Analysis

Rclone versions 1.48.0 through 1.73.4 are vulnerable to unauthenticated remote code execution. If the Remote Control (RC) interface is reachable, an attacker can execute local commands by providing a malicious backend definition in a single request. Users should update to version 1.73.5 immediately.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-78CWE-306

EPSS

Probability of exploitation (next 30 days): 0.0960 (9.6%)
Percentile: 92.9%
EPSS: 2026-05-06

Affects

rclone:rclone

Technical description

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Starting in version 1.48.0 and prior to version 1.73.5, the RC endpoint `operations/fsinfo` is exposed without `AuthRequired: true` and accepts attacker-controlled `fs` input. Because `rc.GetFs(...)` supports inline backend definitions, an unauthenticated attacker can instantiate an attacker-controlled backend on demand. For the WebDAV backend, `bearer_token_command` is executed during backend initialization, making single-request unauthenticated local command execution possible on reachable RC deployments without global HTTP authentication. Version 1.73.5 patches the issue.

Published: 4/23/2026, 12:16:45 AM
Last modified: 4/27/2026, 6:18:08 PM

References

HomeEventsBlogResourcesTeam