Report: CVE-2026-41176 - Rclone: Unauthenticated options/set allows runtime auth bypass, leading to sensi

Report: CVE-2026-41176 - Rclone: Unauthenticated options/set allows runtime auth bypass, leading to sensi

CVE ID :CVE-2026-41176 Published : April 23, 2026, 12:16 a.m. | 1 hour, 8 minutes ago Description :Rclone is a command-line program to sync files and directories to and from different cloud storage providers. The RC endpoint `options/set` is exposed without `AuthRequired: true`, but it can mutate global runtime configuration, including the RC option block itself. Starting in version 1.45.0 and prior to version 1.73.5, an unauthenticated attacker can set `rc.NoAuth=true`, which disables the authorization gate for many RC methods registered with `AuthRequired: true` on reachable RC servers that are started without global HTTP authentication. This can lead to unauthorized access to sensitive administrative functionality, including configuration and operational RC methods. Version 1.73.5 patches the issue. Severity: 9.2 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
CRITICAL
Published
April 23, 2026