zrok is software for sharing web services, files, and network resources. Prior to version 2.0.2, the zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization but does not prevent symlink following. When a symbolic link inside the shared DriveRoot points to a location outside that root, remote WebDAV consumers can read files and—on shares without OS-level permission restrictions—write or overwrite files anywhere on the host filesystem accessible to the zrok process. This issue has been patched in version 2.0.2.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-74m3-9qvm-rp9h | zrok: WebDAV drive backend follows symlinks outside DriveRoot, enabling host filesystem read/write |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 08 May 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openziti
Openziti zrok |
|
| Vendors & Products |
Openziti
Openziti zrok |
Fri, 08 May 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | zrok is software for sharing web services, files, and network resources. Prior to version 2.0.2, the zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization but does not prevent symlink following. When a symbolic link inside the shared DriveRoot points to a location outside that root, remote WebDAV consumers can read files and—on shares without OS-level permission restrictions—write or overwrite files anywhere on the host filesystem accessible to the zrok process. This issue has been patched in version 2.0.2. | |
| Title | zrok: WebDAV drive backend follows symlinks outside DriveRoot, enabling host filesystem read/write | |
| Weaknesses | CWE-22 CWE-61 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T03:45:57.209Z
Reserved: 2026-04-26T11:53:27.708Z
Link: CVE-2026-42275
No data.
Status : Received
Published: 2026-05-08T04:16:22.823
Modified: 2026-05-08T04:16:22.823
Link: CVE-2026-42275
No data.
OpenCVE Enrichment
Updated: 2026-05-08T05:30:45Z
Github GHSA