{
  "threat_severity" : "Important",
  "public_date" : "2026-04-22T23:57:54Z",
  "bugzilla" : {
    "description" : "github.com/rclone/rclone: Rclone: Unauthorized access to administrative functions through unauthenticated Remote Control endpoint.",
    "id" : "2460989",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2460989"
  },
  "cvss3" : {
    "cvss3_base_score" : "9.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "status" : "draft"
  },
  "cwe" : "CWE-15",
  "details" : [ "Rclone is a command-line program to sync files and directories to and from different cloud storage providers. The RC endpoint `options/set` is exposed without `AuthRequired: true`, but it can mutate global runtime configuration, including the RC option block itself. Starting in version 1.45.0 and prior to version 1.73.5, an unauthenticated attacker can set `rc.NoAuth=true`, which disables the authorization gate for many RC methods registered with `AuthRequired: true` on reachable RC servers that are started without global HTTP authentication. This can lead to unauthorized access to sensitive administrative functionality, including configuration and operational RC methods. Version 1.73.5 patches the issue.", "A flaw was found in Rclone, a command-line program designed for synchronizing files with various cloud storage providers. An unauthenticated attacker can exploit an exposed Remote Control (RC) endpoint, `options/set`, to disable the authorization mechanism for other RC methods. This vulnerability allows the attacker to gain unauthorized access to sensitive administrative functionality, including configuration and operational control of the Rclone server." ],
  "statement" : "The vulnerable functionality exists in the RC server. Thus, for the vulnerability to be exploited, the RC server must be started, via `rclone rcd` or the `--rc` flag. Additionally, the RC server must be deployed without any required authentication. Because Red Hat products either do not include this functionality, or expose it only to localhost, Red Hat assesses the impact of this vulnerability as `Important`.",
  "package_state" : [ {
    "product_name" : "OpenShift API for Data Protection",
    "fix_state" : "Not affected",
    "package_name" : "oadp/oadp-mustgather-rhel9",
    "cpe" : "cpe:/a:redhat:openshift_api_data_protection:1"
  }, {
    "product_name" : "OpenShift API for Data Protection",
    "fix_state" : "Not affected",
    "package_name" : "oadp/oadp-velero-restic-restore-helper-rhel9",
    "cpe" : "cpe:/a:redhat:openshift_api_data_protection:1"
  }, {
    "product_name" : "OpenShift API for Data Protection",
    "fix_state" : "Not affected",
    "package_name" : "oadp/oadp-velero-rhel9",
    "cpe" : "cpe:/a:redhat:openshift_api_data_protection:1"
  }, {
    "product_name" : "Red Hat Advanced Cluster Management for Kubernetes 2",
    "fix_state" : "Not affected",
    "package_name" : "rhacm2/volsync-rhel9",
    "cpe" : "cpe:/a:redhat:acm:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-41176\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-41176\nhttps://github.com/rclone/rclone/blob/bf55d5e6d37fd86164a87782191f9e1ffcaafa82/fs/rc/config.go\nhttps://github.com/rclone/rclone/blob/bf55d5e6d37fd86164a87782191f9e1ffcaafa82/fs/rc/rcserver/rcserver.go\nhttps://github.com/rclone/rclone/security/advisories/GHSA-25qr-6mpr-f7qx" ],
  "name" : "CVE-2026-41176",
  "csaw" : false
}