Description
Unraid Authentication Request Path Traversal Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Unraid. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the auth-request.php file. The issue results from the lack of proper validation of a user-supplied path prior to using it in authentications. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-28912.
Published: 2026-03-13
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Patch Immediately
AI Analysis

Impact

This vulnerability in Unraid allows remote attackers to bypass authentication without any prior credentials by exploiting improper path validation in the auth-request.php file. The flaw enables a crafted request to supply a user-controlled path that is used in authentication logic, resulting in unauthorized access to the system. The attack achieves high impact by granting an attacker full control over the Unraid installation, exposing all stored data and exposing the platform to further exploitation. The weakness corresponds to CWE-22: Path Traversal.

Affected Systems

Affected vendor: Unraid; impacted product: Unraid OS 7.2.3. The cpe entry cpe:2.3:o:unraid:unraid:7.2.3:*:*:*:*:*:*:* indicates that only this version is listed as vulnerable; no other versions are explicitly reported as affected in the supplied data.

Risk and Exploitability

The CVSS v3 score of 7.3 indicates medium‑to‑high severity. EPSS shows a probability of exploitation of less than 1 %, suggesting that while the vulnerability is high impact, the likelihood of real‑world exploitation is currently low, and it has not yet entered CISA’s KEV catalog. Attackers can exploit this by sending a crafted HTTP request to auth-request.php containing a malicious path; the vulnerability exists remotely and does not require authentication to be used.

Generated by OpenCVE AI on March 17, 2026 at 16:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a vendor‑supplied patch or upgrade Unraid OS to a version that fixes the auth-request.php path validation issue. If a patch is not yet available, restrict external access to the Unraid web interface to trusted IP addresses only. Monitor logs for anomalous authentication requests and validate that path parameters are correctly sanitized. Re‑check Unraid’s advisory page for updates after the initial release of the fix.

Generated by OpenCVE AI on March 17, 2026 at 16:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:unraid:unraid:7.2.3:*:*:*:*:*:*:*

Mon, 16 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Unraid
Unraid unraid
Vendors & Products Unraid
Unraid unraid

Fri, 13 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description Unraid Authentication Request Path Traversal Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Unraid. Authentication is not required to exploit this vulnerability. The specific flaw exists within the auth-request.php file. The issue results from the lack of proper validation of a user-supplied path prior to using it in authentications. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-28912.
Title Unraid Authentication Request Path Traversal Authentication Bypass Vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-03-16T20:22:41.363Z

Reserved: 2026-03-09T16:03:01.958Z

Link: CVE-2026-3839

cve-icon Vulnrichment

Updated: 2026-03-16T20:22:37.444Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:53.033

Modified: 2026-03-17T14:19:01.977

Link: CVE-2026-3839

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:39:46Z

Weaknesses