Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user‑supplied paths when creating shares.
By specifying a writable path within the public web root, an attacker can upload and execute arbitrary code on the server, resulting in remote code execution (RCE). This vulnerability allows a low-privileged user to fully compromise the affected Erugo instance. Version 0.2.15 fixes the issue.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 29 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Erugooss
Erugooss erugo
Vendors & Products Erugooss
Erugooss erugo

Wed, 28 Jan 2026 22:30:00 +0000

Type Values Removed Values Added
Description Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user‑supplied paths when creating shares. By specifying a writable path within the public web root, an attacker can upload and execute arbitrary code on the server, resulting in remote code execution (RCE). This vulnerability allows a low-privileged user to fully compromise the affected Erugo instance. Version 0.2.15 fixes the issue.
Title Authenticated Remote Code Execution via Arbitrary File Upload
Weaknesses CWE-22
CWE-434
CWE-94
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-29T16:54:12.343Z

Reserved: 2026-01-27T19:35:20.529Z

Link: CVE-2026-24897

cve-icon Vulnrichment

Updated: 2026-01-29T16:00:10.666Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-28T23:15:51.270

Modified: 2026-01-29T17:16:25.253

Link: CVE-2026-24897

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-29T09:08:50Z

Weaknesses