🔐 CVE Alert

CVE-2026-42275

HIGH 8.7

zrok: WebDAV drive backend follows symlinks outside DriveRoot, enabling host filesystem read/write

CVSS Score
8.7
EPSS Score
0.0%
EPSS Percentile
0th

zrok is software for sharing web services, files, and network resources. Prior to version 2.0.2, the zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization but does not prevent symlink following. When a symbolic link inside the shared DriveRoot points to a location outside that root, remote WebDAV consumers can read files and—on shares without OS-level permission restrictions—write or overwrite files anywhere on the host filesystem accessible to the zrok process. This issue has been patched in version 2.0.2.

CWE CWE-61 CWE-22
Vendor openziti
Product zrok
Published May 8, 2026
Last Updated May 8, 2026
Stay Ahead of the Next One

Get instant alerts for openziti zrok

Be the first to know when new high vulnerabilities affecting openziti zrok are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

openziti / zrok
< 2.0.2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/openziti/zrok/security/advisories/GHSA-74m3-9qvm-rp9h github.com: https://github.com/openziti/zrok/commit/459bcfc1e121decae1b1d11c37ad94e4ed5bbf2e github.com: https://github.com/openziti/zrok/releases/tag/v2.0.2