Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-puyv-es86-uua3
Summary
Rclone: Unauthenticated options/set allows runtime auth bypass, leading to sensitive operations and command execution
### Summary
The RC endpoint `options/set` is exposed without `AuthRequired: true`, but it can mutate global runtime configuration, including the RC option block itself. An unauthenticated attacker can set `rc.NoAuth=true`, which disables the authorization gate for many RC methods registered with `AuthRequired: true` on reachable RC servers that are started without global HTTP authentication. This can lead to unauthorized access to sensitive administrative functionality, including configuration and operational RC methods.

### Preconditions

Preconditions for this vulnerability are:

- The rclone remote control API **must** be enabled, either by the `--rc` flag or by running the `rclone rcd` server
- The remote control API **must** be reachable by the attacker - by default rclone only serves the rc to localhost unless the `--rc-addr` flag is in use
- The rc must have been deployed **without** global RC HTTP authentication - so not using `--rc-user`/`--rc-pass`/`--rc-htpasswd`/etc

### Details
The root cause is present from v1.45 onward. Some higher-impact exploitation paths became available in later releases as additional RC functionality was introduced.

The issue is caused by two properties of the RC implementation:

1. `options/set` is exposed without `AuthRequired: true`
2. the RC server enforces authorization for `AuthRequired` calls using the mutable runtime value `s.opt.NoAuth`

Relevant code paths:

- [`fs/rc/config.go`](https://github.com/rclone/rclone/blob/bf55d5e6d37fd86164a87782191f9e1ffcaafa82/fs/rc/config.go)
  - registers `options/set` without `AuthRequired: true`
  - `rcOptionsSet` reshapes attacker-controlled input into global option blocks

- [`fs/rc/rcserver/rcserver.go`](https://github.com/rclone/rclone/blob/bf55d5e6d37fd86164a87782191f9e1ffcaafa82/fs/rc/rcserver/rcserver.go)
  - request handling checks:
    - `if !s.opt.NoAuth && call.AuthRequired && !s.server.UsingAuth()`
  - once `rc.NoAuth` is changed to `true`, later `AuthRequired` methods become callable without credentials

This creates a runtime auth-bypass primitive on the RC interface.

After setting `rc.NoAuth=true`, previously protected administrative methods become callable, including configuration and operational endpoints such as:

- `config/listremotes`
- `config/dump`
- `config/get`
- `operations/list`
- `operations/copyfile`
- `core/command`

Relevant code for the second-stage command execution path:

- [`fs/metadata.go`](https://github.com/rclone/rclone/blob/bf55d5e6d37fd86164a87782191f9e1ffcaafa82/fs/metadata.go)
  - `metadataMapper()` uses `exec.Command(...)`

- [`fs/operations/rc.go`](https://github.com/rclone/rclone/blob/bf55d5e6d37fd86164a87782191f9e1ffcaafa82/fs/operations/rc.go)
  - `operations/copyfile` is normally `AuthRequired: true`
  - once `rc.NoAuth=true`, it becomes reachable without credentials

This was validating using the following:
- current `master` as of 2026-04-14: `bf55d5e6d37fd86164a87782191f9e1ffcaafa82`
- latest public release tested locally: `v1.73.4`

The issue was also verified on a public amd64 Ubuntu host controlled by the tester, using direct host execution (not containerized PoC execution).

### PoC
#### Minimal reproduction
Start a vulnerable server:

```bash
rclone rcd --rc-addr 127.0.0.1:5572
```

No `--rc-user`, no `--rc-pass`, no `--rc-htpasswd`.

First confirm that a protected RC method is initially blocked:

```bash
curl -sS -X POST http://127.0.0.1:5572/config/listremotes \
  -H 'Content-Type: application/json' \
  --data '{}'
```

Expected result: HTTP 403.

Use unauthenticated `options/set` to disable the auth gate:

```bash
curl -sS -X POST http://127.0.0.1:5572/options/set \
  -H 'Content-Type: application/json' \
  --data '{"rc":{"NoAuth":true}}'
```

Expected result: HTTP 200 `{}`

Then call the same protected method again without credentials:

```bash
curl -sS -X POST http://127.0.0.1:5572/config/listremotes \
  -H 'Content-Type: application/json' \
  --data '{}'
```

Expected result: HTTP 200 with a JSON response such as:

```json
{"remotes":[]}
```

#### Testing performed
This was successfully reproduced:
- on the tester's ocal test environment
- on a public amd64 Ubuntu host controlled by the tester

Using the public host, the following was confirmed:

- unauthenticated `options/set` successfully set `rc.NoAuth=true`
- previously protected RC methods became callable without credentials
- the issue was reproducible through direct host execution

### Impact
This is an authorization bypass on the RC administrative interface.

It can allow an unauthenticated network attacker, on a reachable RC deployment without global HTTP authentication, to disable the intended auth boundary for protected RC methods and gain access to sensitive configuration and operational functionality.

Depending on the enabled RC surface and runtime configuration, this can further enable higher-impact outcomes such as local file read, credential/config disclosure, filesystem enumeration, and command execution.
Aliases
0
alias CVE-2026-41176
1
alias GHSA-25qr-6mpr-f7qx
Fixed_packages
0
url pkg:golang/github.com/rclone/rclone@1.73.5
purl pkg:golang/github.com/rclone/rclone@1.73.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/rclone/rclone@1.73.5
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-41176.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-41176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-41176
reference_id
reference_type
scores
0
value 0.02794
scoring_system epss
scoring_elements 0.86139
published_at 2026-04-26T12:55:00Z
1
value 0.02794
scoring_system epss
scoring_elements 0.86129
published_at 2026-04-24T12:55:00Z
2
value 0.063
scoring_system epss
scoring_elements 0.91018
published_at 2026-05-07T12:55:00Z
3
value 0.063
scoring_system epss
scoring_elements 0.90986
published_at 2026-04-29T12:55:00Z
4
value 0.063
scoring_system epss
scoring_elements 0.91003
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-41176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-41176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-41176
3
reference_url https://github.com/rclone/rclone
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rclone/rclone
4
reference_url https://github.com/rclone/rclone/security/advisories/GHSA-25qr-6mpr-f7qx
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-04-23T14:36:39Z/
url https://github.com/rclone/rclone/security/advisories/GHSA-25qr-6mpr-f7qx
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-41176
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-41176
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134734
reference_id 1134734
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134734
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460989
reference_id 2460989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460989
8
reference_url https://github.com/rclone/rclone/blob/bf55d5e6d37fd86164a87782191f9e1ffcaafa82/fs/rc/config.go
reference_id config.go
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-04-23T14:36:39Z/
url https://github.com/rclone/rclone/blob/bf55d5e6d37fd86164a87782191f9e1ffcaafa82/fs/rc/config.go
9
reference_url https://github.com/rclone/rclone/blob/bf55d5e6d37fd86164a87782191f9e1ffcaafa82/fs/rc/rcserver/rcserver.go
reference_id rcserver.go
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-04-23T14:36:39Z/
url https://github.com/rclone/rclone/blob/bf55d5e6d37fd86164a87782191f9e1ffcaafa82/fs/rc/rcserver/rcserver.go
Weaknesses
0
cwe_id 306
name Missing Authentication for Critical Function
description The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
1
cwe_id 15
name External Control of System or Configuration Setting
description One or more system settings or configuration elements can be externally controlled by a user.
Exploits
Severity_range_score9.0 - 10.0
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-puyv-es86-uua3