VYPR
Critical severity9.8NVD Advisory· Published Apr 23, 2026· Updated Apr 27, 2026

CVE-2026-41176

CVE-2026-41176

Description

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. The RC endpoint options/set is exposed without AuthRequired: true, but it can mutate global runtime configuration, including the RC option block itself. Starting in version 1.45.0 and prior to version 1.73.5, an unauthenticated attacker can set rc.NoAuth=true, which disables the authorization gate for many RC methods registered with AuthRequired: true on reachable RC servers that are started without global HTTP authentication. This can lead to unauthorized access to sensitive administrative functionality, including configuration and operational RC methods. Version 1.73.5 patches the issue.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/rclone/rcloneGo
>= 1.45.0, < 1.73.51.73.5

Affected products

1
  • cpe:2.3:a:rclone:rclone:*:*:*:*:*:*:*:*
    Range: >=1.45,<1.73.5

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

1