VYPR
High severity8.3GHSA Advisory· Published May 19, 2026· Updated May 19, 2026

zrok copy writes attacker-controlled WebDAV paths outside the destination root

CVE-2026-45576

Description

Summary

Alice runs zrok2 copy from a WebDAV or zrok drive controlled by Bob into a local filesystem target. Bob returns a DAV href such as /../outside.txt. The sync pipeline stores that path in the source inventory and passes it to FilesystemTarget.WriteStream, which joins it with the target root and creates the file outside Alice's selected directory.

Impact

Users given access to a zrok share may be able to traverse the directory tree arbitrarily with the sharing users credentials, allowing for sensitive information to be overwritten.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Path traversal in zrok copy allows an attacker controlling a WebDAV share to write files outside the destination directory.

Vulnerability

Overview

The vulnerability resides in the zrok copy command when copying from a WebDAV or zrok drive controlled by an attacker (Bob) to a local filesystem target. Bob can return a DAV href containing path traversal sequences such as /../outside.txt. The sync pipeline stores this path in the source inventory and passes it to FilesystemTarget.WriteStream, which joins it with the target root without proper sanitization, resulting in file creation outside Alice's selected directory [1][2].

Exploitation

An attacker who has been granted access to a zrok share can exploit this by crafting a malicious WebDAV response with a path traversal payload. No additional authentication is required beyond the existing share access. The attack is triggered when the victim (Alice) runs zrok2 copy from the attacker-controlled share to a local directory [1][2].

Impact

Successful exploitation allows the attacker to write arbitrary files to any location on the victim's filesystem that the zrok process has write access to. This can lead to overwriting sensitive files, potentially enabling code execution or privilege escalation depending on the target system configuration [1][2].

Mitigation

As of the advisory publication date, versions 0.4.23 through 1.1.11 are affected. Users should update to a patched version once available and restrict access to zrok shares to trusted parties only [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.