AzuraCast is a self-hosted, all-in-one web radio management suite. Prior to version 0.23.6, the currentDirectory request parameter in the Flow.js media upload endpoint (POST /api/station/{station_id}/files/upload) is not sanitized for path traversal sequences. When combined with a local filesystem storage backend (the default), an authenticated user with media management permissions can write arbitrary files outside the station's media storage directory, achieving remote code execution by writing a PHP webshell to the web root. This issue has been patched in version 0.23.6.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vp2f-cqqp-478j | AzuraCast has Path Traversal in `currentDirectory` Parameter that Enables Remote Code Execution via Media Upload |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 09 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Azuracast
Azuracast azuracast |
|
| Vendors & Products |
Azuracast
Azuracast azuracast |
Sat, 09 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AzuraCast is a self-hosted, all-in-one web radio management suite. Prior to version 0.23.6, the currentDirectory request parameter in the Flow.js media upload endpoint (POST /api/station/{station_id}/files/upload) is not sanitized for path traversal sequences. When combined with a local filesystem storage backend (the default), an authenticated user with media management permissions can write arbitrary files outside the station's media storage directory, achieving remote code execution by writing a PHP webshell to the web root. This issue has been patched in version 0.23.6. | |
| Title | AzuraCast: Path Traversal in `currentDirectory` Parameter Enables Remote Code Execution via Media Upload | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-09T19:44:05.893Z
Reserved: 2026-04-29T00:31:15.725Z
Link: CVE-2026-42605
No data.
Status : Received
Published: 2026-05-09T20:16:30.020
Modified: 2026-05-09T20:16:30.020
Link: CVE-2026-42605
No data.
OpenCVE Enrichment
Updated: 2026-05-09T21:30:41Z
Weaknesses
Github GHSA