Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-41179

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Starting in version 1.48.0 and prior to version 1.73.5, the RC endpoint `operations/fsinfo` is exposed without `AuthRequired: true` and accepts attacker-controlled `fs` input. Because `rc.GetFs(...)` supports inline backend definitions, an unauthenticated attacker can instantiate an attacker-controlled backend on demand. For the WebDAV backend, `bearer_token_command` is executed during backend initialization, making single-request unauthenticated local command execution possible on reachable RC deployments without global HTTP authentication. Version 1.73.5 patches the issue.

Ver en NVD

Análisis

Rclone versions 1.48.0 through 1.73.4 are vulnerable to unauthenticated remote code execution. If the Remote Control (RC) interface is reachable, an attacker can execute local commands by providing a malicious backend definition in a single request. Users should update to version 1.73.5 immediately.

Severidad

Puntaje: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-78CWE-306

EPSS

Probabilidad de explotación (próx. 30 días): 0.0960 (9.6%)
Percentil: 92.9%
EPSS: 2026-05-06

Afecta

rclone:rclone

Descripción técnica

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Starting in version 1.48.0 and prior to version 1.73.5, the RC endpoint `operations/fsinfo` is exposed without `AuthRequired: true` and accepts attacker-controlled `fs` input. Because `rc.GetFs(...)` supports inline backend definitions, an unauthenticated attacker can instantiate an attacker-controlled backend on demand. For the WebDAV backend, `bearer_token_command` is executed during backend initialization, making single-request unauthenticated local command execution possible on reachable RC deployments without global HTTP authentication. Version 1.73.5 patches the issue.

Publicada: 23/4/2026, 0:16:45
Última modificación: 27/4/2026, 18:18:08

Referencias

InicioEventosBlogRecursosEquipo