CVE-2026-3839

| EUVD-2026-12168 HIGH
2026-03-13 zdi
7.3
CVSS 3.0
Share

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 13, 2026 - 21:01 vuln.today
EUVD ID Assigned
Mar 13, 2026 - 21:01 euvd
EUVD-2026-12168
CVE Published
Mar 13, 2026 - 20:38 nvd
HIGH 7.3

Description

Unraid Authentication Request Path Traversal Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Unraid. Authentication is not required to exploit this vulnerability. The specific flaw exists within the auth-request.php file. The issue results from the lack of proper validation of a user-supplied path prior to using it in authentications. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-28912.

Analysis

Critical authentication bypass vulnerability in Unraid's auth-request.php file that allows remote attackers to gain unauthorized access without credentials through path traversal exploitation. The vulnerability affects all versions of Unraid (CPE indicates no version restrictions) and can be exploited over the network with low complexity, potentially compromising system confidentiality, integrity, and availability. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all Unraid deployments and restrict network access to auth-request.php via firewall rules; document current access logs for signs of exploitation. Within 7 days: Implement WAF rules to block suspicious path traversal patterns targeting auth-request.php; consider disabling remote authentication if not operationally critical. …

Sign in for detailed remediation steps.

Priority Score

37
Low Medium High Critical
KEV: 0
EPSS: +0.3
CVSS: +36
POC: 0

Share

CVE-2026-3839 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy