CVE-2025-68116

FileRise is a self-hosted web file manager / WebDAV server. Versions prior to 2.7.1 are vulnerable to Stored Cross-Site Scripting (XSS) due to unsafe handling of browser-renderable user uploads when served through the sharing and download endpoints. An attacker who can get a crafted SVG (primary) or HTML (secondary) file stored in a FileRise instance can cause JavaScript execution when a victim opens a generated share link (and in some cases via the direct download endpoint). This impacts share links (`/api/file/share.php`) and direct file access / download path (`/api/file/download.php`), depending on browser/content-type behavior. Version 2.7.1 fixes the issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:filerise:filerise:*:*:*:*:*:*:*:*

History

02 Jan 2026, 16:48

Type Values Removed Values Added
CPE cpe:2.3:a:filerise:filerise:*:*:*:*:*:*:*:*
References () https://github.com/error311/FileRise/security/advisories/GHSA-35pp-ggh6-c59c - () https://github.com/error311/FileRise/security/advisories/GHSA-35pp-ggh6-c59c - Exploit, Third Party Advisory
First Time Filerise
Filerise filerise

16 Dec 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-16 17:16

Updated : 2026-01-02 16:48


NVD link : CVE-2025-68116

Mitre link : CVE-2025-68116

CVE.ORG link : CVE-2025-68116


JSON object : View

Products Affected

filerise

  • filerise
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')