By specifying a writable path within the public web root, an attacker can upload and execute arbitrary code on the server, resulting in remote code execution (RCE). This vulnerability allows a low-privileged user to fully compromise the affected Erugo instance. Version 0.2.15 fixes the issue.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Erugo
Erugo erugo |
|
| CPEs | cpe:2.3:a:erugo:erugo:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Erugo
Erugo erugo |
Thu, 29 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Erugooss
Erugooss erugo |
|
| Vendors & Products |
Erugooss
Erugooss erugo |
Wed, 28 Jan 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user‑supplied paths when creating shares. By specifying a writable path within the public web root, an attacker can upload and execute arbitrary code on the server, resulting in remote code execution (RCE). This vulnerability allows a low-privileged user to fully compromise the affected Erugo instance. Version 0.2.15 fixes the issue. | |
| Title | Authenticated Remote Code Execution via Arbitrary File Upload | |
| Weaknesses | CWE-22 CWE-434 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-29T16:54:12.343Z
Reserved: 2026-01-27T19:35:20.529Z
Link: CVE-2026-24897
Updated: 2026-01-29T16:00:10.666Z
Status : Analyzed
Published: 2026-01-28T23:15:51.270
Modified: 2026-02-09T15:32:42.827
Link: CVE-2026-24897
No data.
OpenCVE Enrichment
Updated: 2026-04-18T14:45:03Z