Cyber Posture

CVE-2026-41179

CriticalPublic PoCRCE

Published: 23 April 2026

Published
23 April 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0960 93.0th percentile
Risk Priority 25 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-41179 is a critical-severity OS Command Injection (CWE-78) vulnerability in Rclone Rclone. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 7.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prohibits unauthenticated actions on sensitive RC endpoints like operations/fsinfo, preventing attacker-controlled backend instantiation and command execution.

prevent

Mandates secure configuration settings such as AuthRequired: true for RC endpoints to block unauthenticated access to attacker-controlled fs input.

prevent

Requires timely patching of the Rclone flaw (upgrade to v1.73.5+), eliminating the unauthenticated endpoint exposure and backend initialization vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables unauthenticated remote code execution via a crafted request to the exposed public-facing RC endpoint (`operations/fsinfo`) in Rclone, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Starting in version 1.48.0 and prior to version 1.73.5, the RC endpoint `operations/fsinfo` is exposed without `AuthRequired: true` and accepts attacker-controlled `fs` input.…

more

Because `rc.GetFs(...)` supports inline backend definitions, an unauthenticated attacker can instantiate an attacker-controlled backend on demand. For the WebDAV backend, `bearer_token_command` is executed during backend initialization, making single-request unauthenticated local command execution possible on reachable RC deployments without global HTTP authentication. Version 1.73.5 patches the issue.

Deeper analysisAI

CVE-2026-41179 affects Rclone, a command-line program for syncing files and directories to and from cloud storage providers. The vulnerability exists in versions 1.48.0 through 1.73.4, specifically in the RC endpoint `operations/fsinfo`, which is exposed without the `AuthRequired: true` setting and accepts attacker-controlled `fs` input. This allows `rc.GetFs(...)` to instantiate an attacker-controlled backend on demand, as it supports inline backend definitions. For the WebDAV backend, the `bearer_token_command` executes during initialization, enabling command execution.

An unauthenticated attacker can exploit this on any reachable RC deployment lacking global HTTP authentication. By sending a single crafted request to the `operations/fsinfo` endpoint with a malicious WebDAV backend configuration, the attacker triggers execution of an arbitrary local command via the `bearer_token_command` feature, achieving remote code execution without prior authentication.

The rclone security advisory GHSA-jfwf-28xr-xw6q confirms that version 1.73.5 patches the issue by addressing the unauthenticated endpoint exposure. Practitioners should upgrade to Rclone 1.73.5 or later and review RC configurations to enforce authentication on all endpoints. Relevant code changes are detailed in the project's GitHub repository for the WebDAV backend, RC operations, and cache modules.

Details

CWE(s)

Affected Products

rclone
rclone
1.48.0 — 1.73.5

CVEs Like This One

CVE-2026-41176Same product: Rclone Rclone
CVE-2025-53072Shared CWE-306
CVE-2026-34285Shared CWE-306
CVE-2026-25084Shared CWE-306
CVE-2026-24177Shared CWE-306
CVE-2025-51958Shared CWE-78
CVE-2026-24790Shared CWE-306
CVE-2026-27446Shared CWE-306
CVE-2026-1364Shared CWE-306
CVE-2017-20236Shared CWE-78

References