๐Ÿ” CVE Alert

CVE-2026-42605

HIGH 8.8

AzuraCast: Path Traversal in `currentDirectory` Parameter Enables Remote Code Execution via Media Upload

CVSS Score
8.8
EPSS Score
0.2%
EPSS Percentile
46th

AzuraCast is a self-hosted, all-in-one web radio management suite. Prior to version 0.23.6, the currentDirectory request parameter in the Flow.js media upload endpoint (POST /api/station/{station_id}/files/upload) is not sanitized for path traversal sequences. When combined with a local filesystem storage backend (the default), an authenticated user with media management permissions can write arbitrary files outside the station's media storage directory, achieving remote code execution by writing a PHP webshell to the web root. This issue has been patched in version 0.23.6.

CWE CWE-22
Vendor azuracast
Product azuracast
Published May 9, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for azuracast azuracast

Be the first to know when new high vulnerabilities affecting azuracast azuracast are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

AzuraCast / AzuraCast
< 0.23.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/AzuraCast/AzuraCast/security/advisories/GHSA-vp2f-cqqp-478j github.com: https://github.com/AzuraCast/AzuraCast/commit/18c793b4427eb49e67a2fea99a89f1c9d9dd808d github.com: https://github.com/AzuraCast/AzuraCast/releases/tag/0.23.6