File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In versions 2.32.0 and prior, the implementation of password protected links is error-prone, resulting in potential unprotected sharing of a file through a direct download link. This link can either be shared unknowingly by a user or discovered from various locations such as the browser history or the log of a proxy server used. At time of publication, no known patched versions are available.
References
Link | Resource |
---|---|
https://github.com/filebrowser/filebrowser/issues/5239 | Issue Tracking |
https://github.com/filebrowser/filebrowser/security/advisories/GHSA-3v48-283x-f2w4 | Exploit Vendor Advisory |
Configurations
History
10 Jul 2025, 14:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Filebrowser filebrowser
Filebrowser |
|
CPE | cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:* | |
References | () https://github.com/filebrowser/filebrowser/issues/5239 - Issue Tracking | |
References | () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-3v48-283x-f2w4 - Exploit, Vendor Advisory |
03 Jul 2025, 15:14
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Jun 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-30 20:15
Updated : 2025-07-10 14:04
NVD link : CVE-2025-52996
Mitre link : CVE-2025-52996
CVE.ORG link : CVE-2025-52996
JSON object : View
Products Affected
filebrowser
- filebrowser
CWE
CWE-305
Authentication Bypass by Primary Weakness