AzuraCast RCE via Path Traversal (CVE-2026-42605)
The National Vulnerability Database has detailed CVE-2026-42605, a critical path traversal vulnerability in AzuraCast, a popular self-hosted web radio management suite. Prior to version 0.23.6, the currentDirectory parameter within the Flow.js media upload endpoint (POST /api/station/{station_id}/files/upload) was not properly sanitized. This flaw, when combined with AzuraCast’s default local filesystem storage backend, allows an authenticated user with media management permissions to write arbitrary files outside their designated media storage directory.
This isn’t just a nuisance; it’s a remote code execution (RCE) vector. An attacker can leverage this path traversal to plant a PHP webshell directly into the web root. With a CVSS score of 8.8 (HIGH), the impact is severe, granting full control over the affected server. The National Vulnerability Database confirms this issue has been patched in version 0.23.6.
This highlights a common pitfall: assuming authenticated access inherently limits damage. Path traversal combined with arbitrary file write is always a bad day, especially when it leads to RCE. Defenders need to recognize that even ‘trusted’ user roles can be weaponized if input validation is weak.
What This Means For You
- If your organization uses AzuraCast, verify immediately that all instances are updated to version 0.23.6 or later. Audit your web server logs for any suspicious file writes outside the normal media directories, particularly PHP files. This vulnerability allows an attacker to drop a webshell, giving them persistent access and control over your server. Don't assume your internal apps are safe from authenticated RCEs.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-42605 - AzuraCast Path Traversal to RCE via Media Upload
title: CVE-2026-42605 - AzuraCast Path Traversal to RCE via Media Upload
id: scw-2026-05-09-ai-1
status: experimental
level: critical
description: |
Detects the specific path traversal exploit targeting the AzuraCast media upload endpoint. The 'currentDirectory' parameter is manipulated with '../' sequences to write files outside the intended directory, leading to potential remote code execution.
author: SCW Feed Engine (AI-generated)
date: 2026-05-09
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-42605/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-method:
- 'POST'
cs-uri:
- '/api/station/*/files/upload'
cs-uri-query|contains:
- 'currentDirectory=../'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-42605 | Path Traversal | AzuraCast versions prior to 0.23.6 |
| CVE-2026-42605 | Path Traversal | Vulnerable endpoint: POST /api/station/{station_id}/files/upload |
| CVE-2026-42605 | Path Traversal | Vulnerable parameter: currentDirectory in Flow.js media upload |
| CVE-2026-42605 | RCE | Achieved by writing a PHP webshell to the web root via path traversal |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 09, 2026 at 23:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.