AzuraCast Patches Two High-Severity Flaws: RCE and Account Takeover
Two vulnerabilities in AzuraCast radio automation software enable authenticated RCE via path traversal and unauthenticated account takeover through password reset poisoning. Upgrade to 0.23.6 now.
AzuraCast, the open-source web radio automation platform, patched two high-severity vulnerabilities this week that could allow attackers to execute code on servers or take over user accounts without authentication. Both flaws were disclosed on May 9 and affect all versions prior to 0.23.6.
Organizations running self-hosted AzuraCast instances should update immediately. The combination of these vulnerabilities creates a path from unauthenticated access to full server compromise.
CVE-2026-42605: Path Traversal to RCE
The first vulnerability (CVE-2026-42605, CVSS 8.8) exists in AzuraCast's Flow.js media upload endpoint. The currentDirectory request parameter lacks proper sanitization, allowing authenticated users with media management permissions to write files outside intended directories.
An attacker can upload a PHP webshell to the web root using path traversal sequences like ../. Once the webshell is in place, executing arbitrary commands requires only a GET request. The authentication requirement limits initial exploitation to users who already have some level of access, but media management is a common permission in radio station deployments.
This pattern—file upload combined with path traversal leading to code execution—appears regularly in web application security. We covered a similar auth bypass leading to RCE in cPanel last month, though that vulnerability didn't require authentication at all.
CVE-2026-42606: Password Reset Poisoning
The second vulnerability (CVE-2026-42606, CVSS 8.1) affects the password reset flow. AzuraCast's ApplyXForwarded middleware unconditionally trusts the X-Forwarded-Host HTTP header without validating it against expected values.
When an attacker triggers a password reset for any user and injects a malicious X-Forwarded-Host header, the reset link sent to the victim contains the attacker's domain instead of the legitimate AzuraCast URL. If the victim clicks the poisoned link, their reset token is sent to the attacker's server.
The attack chain works like this:
- Attacker requests password reset for victim's email
- Attacker includes
X-Forwarded-Host: attacker.comin the request - Victim receives email with reset link pointing to attacker.com
- Victim clicks link, sending token to attacker
- Attacker uses token on real AzuraCast instance to reset password
- Password reset also destroys 2FA configuration, bypassing additional authentication
This vulnerability requires no authentication and can target any user account, including administrators.
Chaining for Full Compromise
An attacker could combine these vulnerabilities for maximum impact:
- Use CVE-2026-42606 to take over an administrator or media manager account
- Use CVE-2026-42605 to upload a webshell with the compromised credentials
- Execute arbitrary commands on the server
The result is unauthenticated remote code execution—starting from nothing, ending with shell access.
Who's Affected
AzuraCast is popular among community radio stations, podcasters, and hobbyist broadcasters who want to run their own streaming infrastructure. The software's self-hosted nature means there's no automatic update mechanism; administrators must manually upgrade their installations.
Shodan queries for AzuraCast instances show deployments across educational institutions, small businesses, and individual operators. The typical AzuraCast user may not have dedicated security resources, making timely patching less likely.
Remediation
Upgrade to AzuraCast version 0.23.6 or later. The official Docker image has been updated with the fix.
If immediate upgrade isn't possible:
- Restrict network access - Place AzuraCast behind a VPN or firewall that limits who can reach the admin interface
- Remove
X-Forwarded-Hostat the proxy - If you're running AzuraCast behind nginx or Apache, strip this header before it reaches the application - Audit media manager permissions - Limit which accounts have upload capabilities
Organizations using reverse proxies should verify their configuration doesn't pass untrusted headers to backend applications. This class of vulnerability affects many applications that trust forwarded headers without validation.
Related Articles
Xerox FreeFlow Core RCE Flaw Lets Attackers Hijack Print Servers
CVE-2026-2251 is a CVSS 9.8 path traversal vulnerability in Xerox FreeFlow Core that enables unauthenticated remote code execution. Upgrade to version 8.1.0 now.
Feb 27, 2026CISA KEV Deadline Hits Today for Unpatched Gogs Zero-Day
CVE-2025-8110 allows authenticated attackers to achieve RCE on self-hosted Git servers via path traversal. Over 700 instances already compromised.
Feb 2, 2026Sentry SAML Flaw Lets Attackers Hijack Any Account—No Password Needed
CVE-2026-42354 (CVSS 9.1) allows attackers to take over any Sentry user account via malicious SAML IdP. Patch to version 26.4.1 immediately.
May 9, 2026Apache HTTP/2 Double-Free Bug Enables DoS and RCE on Default Installs
CVE-2026-23918 in Apache 2.4.66 lets attackers crash servers or achieve code execution with just two HTTP/2 frames. Upgrade to 2.4.67 immediately.
May 6, 2026