Vulnerability Description
zrok is software for sharing web services, files, and network resources. Prior to version 2.0.2, the zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization but does not prevent symlink following. When a symbolic link inside the shared DriveRoot points to a location outside that root, remote WebDAV consumers can read files and—on shares without OS-level permission restrictions—write or overwrite files anywhere on the host filesystem accessible to the zrok process. This issue has been patched in version 2.0.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netfoundry | Zrok | < 2.0.2 |
Related Weaknesses (CWE)
References
- https://github.com/openziti/zrok/commit/459bcfc1e121decae1b1d11c37ad94e4ed5bbf2ePatch
- https://github.com/openziti/zrok/releases/tag/v2.0.2ProductRelease Notes
- https://github.com/openziti/zrok/security/advisories/GHSA-74m3-9qvm-rp9hVendor Advisory
FAQ
What is CVE-2026-42275?
CVE-2026-42275 is a vulnerability with a CVSS score of 8.7 (HIGH). zrok is software for sharing web services, files, and network resources. Prior to version 2.0.2, the zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization bu...
How severe is CVE-2026-42275?
CVE-2026-42275 has been rated HIGH with a CVSS base score of 8.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-42275?
Check the references section above for vendor advisories and patch information. Affected products include: Netfoundry Zrok.