CVE-2026-42605 - AzuraCast: Path Traversal in `currentDirectory` Parameter Enables Remote Code Execution via Media Upload
CVE ID :CVE-2026-42605 Published : May 9, 2026, 8:16 p.m. | 48 minutes ago Description :AzuraCast is a self-hosted, all-in-one web radio management suite. Prior to version 0.23.6, the currentDirectory request parameter in the Flow.js media upload endpoint (POST /api/station/{station_id}/files/
ORIGINAL SOURCE →via CVE Feed Latest
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] Help with an Escalating Cyber-Stalker
- [CYBER] Cheap Dedicated CI/CD Runners for GitLab: Shared vs Self-Hosted vs Rented
- [CYBER] Cyber fraudsters dupe Goans of Rs 46 L through fake online schemes - navhindtimes.in
- [CYBER] CVE-2026-8195 - JeecgBoot SVG File CommonController.java cross site scripting
- [CYBER] CVE-2026-8194 - osTicket Dispatcher class.dispatcher.php cross-site request forgery
- [CYBER] CVE-2026-42606 - AzuraCast: Password Reset Poisoning via Untrusted X-Forwarded-Host Header Leads to Account Takeover and 2FA Bypass