CVE-2026-41176

CRITICAL NUCLEI

Rclone: Unauthenticated options/set allows runtime auth bypass, leading to sensitive operations and command execution

Title source: cna

Description

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. The RC endpoint `options/set` is exposed without `AuthRequired: true`, but it can mutate global runtime configuration, including the RC option block itself. Starting in version 1.45.0 and prior to version 1.73.5, an unauthenticated attacker can set `rc.NoAuth=true`, which disables the authorization gate for many RC methods registered with `AuthRequired: true` on reachable RC servers that are started without global HTTP authentication. This can lead to unauthorized access to sensitive administrative functionality, including configuration and operational RC methods. Version 1.73.5 patches the issue.

Nuclei Templates (1)

Rclone RC - Broken Access Control
CRITICALVERIFIEDby theamanrawat

Scores

CVSS v4 9.2
EPSS 0.0279
EPSS Percentile 86.1%
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Details

CWE
CWE-306
Status published
Products (1)
rclone/rclone >= 1.45.0, < 1.73.5
Published Apr 23, 2026
Tracked Since Apr 23, 2026