The RC endpoint operations/fsinfo is exposed without AuthRequired: true and accepts attacker-controlled fs input. Because rc.GetFs(...) supports inline backend definitions, an unauthenticated attacker can instantiate an attacker-controlled backend on demand. For the WebDAV backend, bearer_token_command is executed during backend initialization, making single-request unauthenticated local command execution possible on reachable RC deployments without global HTTP authentication.
Preconditions for this vulnerability are:
--rc flag or by running the rclone rcd server--rc-addr flag is in use--rc-user/--rc-pass/--rc-htpasswd/etcThe root cause consists of the following pieces:
operations/fsinfo is not protected with AuthRequired: trueoperations/fsinfo calls rc.GetFs(...) on attacker-controlled inputrc.GetFs(...) supports inline backend creation through object-valued fsbearer_token_commandRelevant code paths:
operations/fsinfo is registered without AuthRequired: truercFsInfo() calls rc.GetFs(ctx, in)GetFs() / GetFsNamed() can parse an object-valued fsgetConfigMap() converts attacker-controlled JSON into a backend config stringbearer_token_command is a supported backend optionNewFs(...) calls fetchAndSetBearerToken() when bearer_token_command is setfetchBearerToken() invokes exec.Command(...)This creates a practical single-request unauthenticated command-execution primitive on reachable RC servers without global HTTP authentication.
This was alidated on:
master as of 2026-04-14: bf55d5e6d37fd86164a87782191f9e1ffcaafa82v1.73.4This was also validated on a public amd64 Ubuntu host controlled by the tester, using direct host execution (not containerized PoC execution).
Start a vulnerable RC server:
rclone rcd --rc-addr 127.0.0.1:5572
No --rc-user, no --rc-pass, no --rc-htpasswd.
Then send a single request:
curl -sS -X POST http://127.0.0.1:5572/operations/fsinfo \
--data-urlencode "fs=:webdav,url='http://127.0.0.1/',vendor=other,bearer_token_command='/usr/bin/touch /tmp/rclone_fsinfo_rce_poc_marker':"
Expected result:
operations/fsinfo/tmp/rclone_fsinfo_rce_poc_marker is created on the hostThis is effectively a single-request unauthenticated command-execution vulnerability on reachable RC deployments without global HTTP authentication.
In practice, command execution in the rclone process context can lead to higher-impact outcomes such as local file read, file write, or shell access, depending on the deployed environment.
This was successfully reproduced:
On the public host it was confirmed:
operations/fsinfo exploit worked{
"license": "CC-BY-4.0",
"sources": [
{
"database_specific": {
"status": "Undergoing Analysis"
},
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2026-41179",
"id": "CVE-2026-41179",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41179",
"published": "2026-04-23T00:16:45.947Z",
"modified": "2026-04-27T14:16:48.460Z",
"imported": "2026-04-27T16:36:07.686Z"
},
{
"id": "GHSA-jfwf-28xr-xw6q",
"url": "https://api.github.com/advisories/GHSA-jfwf-28xr-xw6q",
"html_url": "https://github.com/advisories/GHSA-jfwf-28xr-xw6q",
"published": "2026-04-22T14:45:10Z",
"modified": "2026-04-23T10:52:57Z",
"imported": "2026-04-27T16:36:14.263Z"
},
{
"id": "EUVD-2026-25144",
"url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2026-25144",
"html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-25144",
"published": "2026-04-23T00:03:36Z",
"modified": "2026-04-25T03:55:41Z",
"imported": "2026-04-27T16:36:01.354Z"
}
]
}