CVE-2026-24897

10.0 CRITICAL
Published: January 28, 2026 Modified: February 09, 2026
View on NVD

Description

Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user‑supplied paths when creating shares. By specifying a writable path within the public web root, an attacker can upload and execute arbitrary code on the server, resulting in remote code execution (RCE). This vulnerability allows a low-privileged user to fully compromise the affected Erugo instance. Version 0.2.15 fixes the issue.

AI Explanation

### 1. Plain-Language Summary This vulnerability allows a low-privileged user (e.g., an account with basic permissions) on the Erugo file-sharing platform to upload malicious files to sensitive server locations by manipulating file paths during sharing. Attackers can exploit this to upload web shells or scripts to the server’s public web directory, enabling full remote control of the system. ### 2. Affected Products/Versions - **Product**: Erugo (self-hosted file-sharing platform). - **Affected Versions**: All versions **up to and including 0.2.14**. - **Fixed Version**: 0.2.15 (and later). ### 3. Attacker’s Exploit Impact If exploited, an attacker could: - **Execute arbitrary code** (e.g., run commands, install malware, or access/steal sensitive data). - **Fully compromise the server**, including all files, user data, and hosted content. - **Lateral movement**: Use the compromised server to attack other internal systems. ### 4. Recommended Remediation - **Immediate Action**: Upgrade Erugo to **version 0.2.15 or later** (the patched version). - **Workaround (if upgrade isn’t immediate)**: Restrict web-root write permissions to low-privileged users and block unauthorized file path traversal via WAF rules (e.g., detect path patterns like `../`). - **Validation**: After patching, verify that low-privileged users can no longer upload files outside designated directories.

Generated: 2026-02-01 00:20

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/ErugoOSS/Erugo/releases/tag/v0.2.15
Source: security-advisories@github.com
Release Notes
https://github.com/ErugoOSS/Erugo/security/advisories/GHSA-336w-hgpq-6369
Source: security-advisories@github.com
Exploit Vendor Advisory
https://github.com/ErugoOSS/Erugo/security/advisories/GHSA-336w-hgpq-6369
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit Vendor Advisory

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
10.0 / 10.0
EPSS (Exploit Probability)
0.2%
37th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

erugo