Two Critical Unauthenticated RCE Vulnerabilities in Rclone, CVSS 9.2, Patch Immediately
Summary
The Centre for Cybersecurity Belgium (CCB) issued a critical security advisory warning of two unauthenticated remote code execution vulnerabilities (CVE-2026-41176 and CVE-2026-41179) affecting Rclone versions prior to 1.73.5. Both vulnerabilities carry a CVSS 4.0 score of 9.2 and allow remote attackers to bypass authentication controls or execute arbitrary commands on affected systems without requiring credentials or elevated privileges. The CCB strongly recommends immediate patching and enabling global HTTP authentication on RC server endpoints. As of the cut-off date of 23 April 2026, there is no indication of active exploitation.
“The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.”
About this source
GovPing monitors Belgium CCB News alt for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 6 changes logged to date.
What changed
The CCB published a critical security advisory identifying two unauthenticated remote code execution vulnerabilities in Rclone, a command-line program used to manage files on cloud storage. CVE-2026-41176 is an authentication bypass on the RC administrative interface, while CVE-2026-41179 is a single-request command-execution vulnerability via the WebDAV backend initialization. Both require the RC API to be enabled and reachable without global HTTP authentication. The CCB recommends patching to version 1.73.5, enabling RC HTTP authentication, and implementing network-level access restrictions.
Organisations running Rclone with the remote control API enabled should treat this as an urgent priority. Any instance serving RC to non-localhost without --rc-user/--rc-pass/--rc-htpasswd authentication is potentially exploitable. Even after patching, organisations should monitor for indicators of historical compromise, as patching does not remediate prior intrusions.
What to do next
- Install updates for vulnerable devices with highest priority after thorough testing
- Enable global HTTP authentication on RC servers
- Implement network-level controls to restrict access to RC server endpoints
- Upscale monitoring and detection to identify suspicious activity
Archived snapshot
Apr 24, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Warning: Two critical unauthenticated code execution vulnerabilities in Rclone, Patch Immediately!
Image
Published : 24/04/2026
- Last update: 24/04/2026
- Affected software: → Rclone
- Type: Remote Code Execution
- CVE/CVSS → CVE-2026-41176: CVSS 9.2 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) → CVE-2026-41179: CVSS 9.2 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)
Sources
Advisory (CVE-2026-41176) - https://github.com/rclone/rclone/security/advisories/GHSA-25qr-6mpr-f7qx
Advisory (CVE-2026-41179) - https://github.com/rclone/rclone/security/advisories/GHSA-jfwf-28xr-xw6q >
Risks
Two critical vulnerabilities have been identified in Rclone. CVE-2026-41176 and CVE-2026-41179 are both unauthenticated code execution vulnerabilities. Either one can be exploited remotely.
Rclone is a command-line program to manage files on cloud storage. It is a popular tool that works with a majority of cloud providers. As more and more organisations rely on the cloud to store data, including sensitive data, vulnerabilities targeting cloud technology become increasingly attractive for threat actors.
As of this publication, there is no indication of active exploitation (cut-off date: 23 April 2026).
Description
CVE-2026-41176 is an authentication bypass vulnerability on the RC (Remote Control) administrative interface of Rclone versions prior to version 1.73.5. An unauthenticated attacker with network access to an Rclone RC server can bypass authentication controls and gain unauthorised access to sensitive administrative functionality, including configuration and operational RC methods.
This could allow attackers to manipulate configuration, access operational RC methods, read sensitive data, and potentially compromise the integrity and confidentiality of stored cloud data and configurations. Depending on the enabled RC surface and runtime configuration, this can lead to local file read, credential/config disclosure, filesystem enumeration, and command execution.
CVE-2026-41179 is a single-request unauthenticated command-execution vulnerability on reachable RC deployments without global HTTP authentication. It affects Rclone versions prior to version 1.73.5. An unauthenticated attacker with network access to an RC deployment can execute arbitrary local commands on the affected system without requiring any authentication or elevated privileges. This is accomplished through a single request by leveraging the WebDAV backend initialization process.
A successful attacker can obtain local file read, file write, or shell access, depending on the deployed environment. This could potentially lead to full system compromise, data theft, lateral movement, or denial of service.
Note for the following preconditions must be met for the exploitation of CVE-2026-41176 and CVE-2026-41179 to be successful:
- The rclone remote control API must be enabled, either by the --rc flag or by running the rclone rcd server.
- The remote control API must be reachable by the attacker - by default rclone only serves the rc to localhost unless the --rc-addr flag is in use.
- The rc must have been deployed without global RC HTTP authentication - so not using --rc-user/--rc-pass/--rc-htpasswd/etc.
Recommended Actions
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
The CCB also recommends enabling global HTTP authentication on RC servers and implementing network-level controls to restrict access to RC server endpoints and the RC service.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.
References
Feedly - https://feedly.com/cve/CVE-2026-41176
Feedly - https://feedly.com/cve/CVE-2026-41179
Related changes
Get daily alerts for Belgium CCB News alt
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CCB.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when Belgium CCB News alt publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.