Path Traversal Vulnerability in AzuraCast Web Radio Management Suite
CVE-2026-42605

8.8HIGH

Key Information:

Vendor

Azuracast

Status
Vendor
CVE Published:
9 May 2026

What is CVE-2026-42605?

AzuraCast, a self-hosted web radio management suite, has a vulnerability affecting versions before 0.23.6. The 'currentDirectory' request parameter in the media upload endpoint is not sanitized for path traversal sequences. An authenticated user with media management permissions can exploit this flaw when using the default local filesystem storage backend, allowing them to write arbitrary files outside the designated media storage directory. This can lead to remote code execution by writing a PHP web shell to the web root. Users are strongly advised to upgrade to version 0.23.6 or later to mitigate this risk.

Affected Version(s)

AzuraCast < 0.23.6

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.