By specifying a writable path within the public web root, an attacker can upload and execute arbitrary code on the server, resulting in remote code execution (RCE). This vulnerability allows a low-privileged user to fully compromise the affected Erugo instance. Version 0.2.15 fixes the issue.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 29 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Erugooss
Erugooss erugo |
|
| Vendors & Products |
Erugooss
Erugooss erugo |
Wed, 28 Jan 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user‑supplied paths when creating shares. By specifying a writable path within the public web root, an attacker can upload and execute arbitrary code on the server, resulting in remote code execution (RCE). This vulnerability allows a low-privileged user to fully compromise the affected Erugo instance. Version 0.2.15 fixes the issue. | |
| Title | Authenticated Remote Code Execution via Arbitrary File Upload | |
| Weaknesses | CWE-22 CWE-434 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-29T16:54:12.343Z
Reserved: 2026-01-27T19:35:20.529Z
Link: CVE-2026-24897
Updated: 2026-01-29T16:00:10.666Z
Status : Awaiting Analysis
Published: 2026-01-28T23:15:51.270
Modified: 2026-01-29T17:16:25.253
Link: CVE-2026-24897
No data.
OpenCVE Enrichment
Updated: 2026-01-29T09:08:50Z