Cyber Posture

CVE-2026-41179

CriticalPublic PoC

Published: 23 April 2026

Published
23 April 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0960 92.9th percentile
Risk Priority 25 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2026-41179 affects Rclone, a command-line program for syncing files and directories to and from cloud storage providers. The vulnerability exists in versions 1.48.0 through 1.73.4, specifically in the RC endpoint `operations/fsinfo`, which is exposed without the `AuthRequired: true` setting and accepts attacker-controlled `fs` input. This allows `rc.GetFs(...)` to instantiate an attacker-controlled backend on demand, as it supports inline backend definitions. For the WebDAV backend, the `bearer_token_command` executes during initialization, enabling command execution.

An unauthenticated attacker can exploit this on any reachable RC deployment lacking global HTTP authentication. By sending a single crafted request to the `operations/fsinfo` endpoint with a malicious WebDAV backend configuration, the attacker triggers execution of an arbitrary local command via the `bearer_token_command` feature, achieving remote code execution without prior authentication.

The rclone security advisory GHSA-jfwf-28xr-xw6q confirms that version 1.73.5 patches the issue by addressing the unauthenticated endpoint exposure. Practitioners should upgrade to Rclone 1.73.5 or later and review RC configurations to enforce authentication on all endpoints. Relevant code changes are detailed in the project's GitHub repository for the WebDAV backend, RC operations, and cache modules.

Details

CWE(s)
CWE-78CWE-306

Affected Products

rclone
rclone
1.48.0 — 1.73.5

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables unauthenticated remote code execution via a crafted request to the exposed public-facing RC endpoint (`operations/fsinfo`) in Rclone, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References