Unraid < 7.2.4 Multiple Vulnerabilities (ZDI-26-171 / ZDI-26-172)

high Nessus Plugin ID 303451

Synopsis

The remote host is running an application that is affected by multiple vulnerabilities.

Description

The remote host is running a version of Unraid prior to 7.2.4. It is, therefore, affected by multiple vulnerabilities:

- A path traversal vulnerability exists in the update.php file due to the lack of proper validation of a user-supplied path prior to using it in file operations. An authenticated, remote attacker can exploit this to execute arbitrary code in the context of root. (CVE-2026-3838)

- A path traversal vulnerability exists in the auth-request.php file due to the lack of proper validation of a user-supplied path prior to using it in authentications. An unauthenticated, remote attacker can exploit this to bypass authentication on the system. (CVE-2026-3839)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Unraid version 7.2.4 or later.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-26-171/

https://www.zerodayinitiative.com/advisories/ZDI-26-172/

Plugin Details

Severity: High

ID: 303451

File Name: unraid_7_2_4.nasl

Version: 1.1

Type: combined

Family: CGI abuses

Published: 3/24/2026

Updated: 3/24/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2026-3838

CVSS v3

Risk Factor: High

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:unraid:unraid

Required KB Items: installed_sw/Unraid

Patch Publication Date: 3/9/2026

Vulnerability Publication Date: 3/9/2026

Reference Information

CVE: CVE-2026-3838, CVE-2026-3839