CVE-2026-24897

Source
https://cve.org/CVERecord?id=CVE-2026-24897
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-24897.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-24897
Aliases
  • GHSA-336w-hgpq-6369
Published
2026-01-28T22:24:49.915Z
Modified
2026-01-30T22:36:38.306294Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Authenticated Remote Code Execution via Arbitrary File Upload
Details

Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user‑supplied paths when creating shares. By specifying a writable path within the public web root, an attacker can upload and execute arbitrary code on the server, resulting in remote code execution (RCE). This vulnerability allows a low-privileged user to fully compromise the affected Erugo instance. Version 0.2.15 fixes the issue.

Database specific
{
    "cwe_ids": [
        "CWE-22",
        "CWE-434",
        "CWE-94"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/24xxx/CVE-2026-24897.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/erugooss/erugo

Affected ranges

Type
GIT
Repo
https://github.com/erugooss/erugo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.1.1
v0.*
v0.0.001
v0.0.002
v0.0.003
v0.0.004
v0.0.005
v0.0.005-g
v0.0.005-n
v0.0.006
v0.0.006b
v0.0.007
v0.0.008
v0.0.009
v0.0.010
v0.0.011
v0.2.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-24897.json"