Unraid Update Request Path Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unraid. Authentication is required to exploit this vulnerability.
The specific flaw exists within the update.php file. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-28951.
References
| Link | Resource |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-26-171/ | Third Party Advisory |
Configurations
History
17 Mar 2026, 14:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.zerodayinitiative.com/advisories/ZDI-26-171/ - Third Party Advisory | |
| CPE | cpe:2.3:o:unraid:unraid:7.2.3:*:*:*:*:*:*:* | |
| First Time |
Unraid
Unraid unraid |
16 Mar 2026, 14:19
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-16 14:19
Updated : 2026-03-17 14:18
NVD link : CVE-2026-3838
Mitre link : CVE-2026-3838
CVE.ORG link : CVE-2026-3838
JSON object : View
Products Affected
unraid
- unraid
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
