Unrated severityOSV Advisory· Published Jan 28, 2026· Updated Jan 29, 2026
Authenticated Remote Code Execution via Arbitrary File Upload
CVE-2026-24897
Description
Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user‑supplied paths when creating shares. By specifying a writable path within the public web root, an attacker can upload and execute arbitrary code on the server, resulting in remote code execution (RCE). This vulnerability allows a low-privileged user to fully compromise the affected Erugo instance. Version 0.2.15 fixes the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/ErugoOSS/Erugo/commit/256bc63831a0b5e9a94cb024a0724e0cd5fa5e38mitrex_refsource_MISC
- github.com/ErugoOSS/Erugo/releases/tag/v0.2.15mitrex_refsource_MISC
- github.com/ErugoOSS/Erugo/security/advisories/GHSA-336w-hgpq-6369mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.