AzuraCast is a self-hosted, all-in-one web radio management suite. Prior to version 0.23.6, the currentDirectory request parameter in the Flow.js media upload endpoint (POST /api/station/{station_id}/files/upload) is not sanitized for path traversal sequences. When combined with a local filesystem storage backend (the default), an authenticated user with media management permissions can write arbitrary files outside the station's media storage directory, achieving remote code execution by writing a PHP webshell to the web root. This issue has been patched in version 0.23.6.
Metrics
Affected Vendors & Products
References
History
Thu, 14 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:azuracast:azuracast:*:*:*:*:*:*:*:* |
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 09 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Azuracast
Azuracast azuracast |
|
| Vendors & Products |
Azuracast
Azuracast azuracast |
Sat, 09 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AzuraCast is a self-hosted, all-in-one web radio management suite. Prior to version 0.23.6, the currentDirectory request parameter in the Flow.js media upload endpoint (POST /api/station/{station_id}/files/upload) is not sanitized for path traversal sequences. When combined with a local filesystem storage backend (the default), an authenticated user with media management permissions can write arbitrary files outside the station's media storage directory, achieving remote code execution by writing a PHP webshell to the web root. This issue has been patched in version 0.23.6. | |
| Title | AzuraCast: Path Traversal in `currentDirectory` Parameter Enables Remote Code Execution via Media Upload | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-05-09T19:44:05.893Z
Updated: 2026-05-11T14:52:29.871Z
Reserved: 2026-04-29T00:31:15.725Z
Link: CVE-2026-42605
Updated: 2026-05-11T14:52:25.790Z
Status : Analyzed
Published: 2026-05-09T20:16:30.020
Modified: 2026-05-14T17:34:59.823
Link: CVE-2026-42605
No data.