CVE-2026-41176
CRITICAL NUCLEIRclone: Unauthenticated options/set allows runtime auth bypass, leading to sensitive operations and command execution
Title source: cnaDescription
Rclone is a command-line program to sync files and directories to and from different cloud storage providers. The RC endpoint `options/set` is exposed without `AuthRequired: true`, but it can mutate global runtime configuration, including the RC option block itself. Starting in version 1.45.0 and prior to version 1.73.5, an unauthenticated attacker can set `rc.NoAuth=true`, which disables the authorization gate for many RC methods registered with `AuthRequired: true` on reachable RC servers that are started without global HTTP authentication. This can lead to unauthorized access to sensitive administrative functionality, including configuration and operational RC methods. Version 1.73.5 patches the issue.
Nuclei Templates (1)
Rclone RC - Broken Access Control
CRITICALVERIFIEDby theamanrawat
Scores
CVSS v4
9.2
EPSS
0.0279
EPSS Percentile
86.1%
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Details
CWE
CWE-306
Status
published
Products (1)
rclone/rclone
>= 1.45.0, < 1.73.5
Published
Apr 23, 2026
Tracked Since
Apr 23, 2026