CVE-2026-42605 – AzuraCast: Path Traversal in `currentDirectory` Parameter Enables Remote Code Execution via Media Upload

​CVE ID :CVE-2026-42605

Published : May 9, 2026, 8:16 p.m. | 52 minutes ago

Description :AzuraCast is a self-hosted, all-in-one web radio management suite. Prior to version 0.23.6, the currentDirectory request parameter in the Flow.js media upload endpoint (POST /api/station/{station_id}/files/upload) is not sanitized for path traversal sequences. When combined with a local filesystem storage backend (the default), an authenticated user with media management permissions can write arbitrary files outside the station’s media storage directory, achieving remote code execution by writing a PHP webshell to the web root. This issue has been patched in version 0.23.6.

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more… To Read More Visit Read More

Leave a Reply

Your email address will not be published. Required fields are marked *