Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-25qr-6mpr-f7qx | Rclone: Unauthenticated options/set allows runtime auth bypass, leading to sensitive operations and command execution |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 23 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rclone is a command-line program to sync files and directories to and from different cloud storage providers. The RC endpoint `options/set` is exposed without `AuthRequired: true`, but it can mutate global runtime configuration, including the RC option block itself. Starting in version 1.45.0 and prior to version 1.73.5, an unauthenticated attacker can set `rc.NoAuth=true`, which disables the authorization gate for many RC methods registered with `AuthRequired: true` on reachable RC servers that are started without global HTTP authentication. This can lead to unauthorized access to sensitive administrative functionality, including configuration and operational RC methods. Version 1.73.5 patches the issue. | |
| Title | Rclone: Unauthenticated options/set allows runtime auth bypass, leading to sensitive operations and command execution | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-23T14:36:47.415Z
Reserved: 2026-04-17T16:34:45.526Z
Link: CVE-2026-41176
Updated: 2026-04-23T14:36:04.300Z
Status : Received
Published: 2026-04-23T00:16:45.800
Modified: 2026-04-23T16:16:25.980
Link: CVE-2026-41176
No data.
OpenCVE Enrichment
No data.
Github GHSA