FileRise is a self-hosted web file manager / WebDAV server. Prior to 3.3.0, an HTML Injection vulnerability allows an authenticated user to modify the DOM and add e.g. form elements that call certain endpoints or link elements that redirect the user on active interaction. This vulnerability is fixed in 3.3.0.
References
Configurations
History
19 Feb 2026, 20:02
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:filerise:filerise:*:*:*:*:*:*:*:* | |
| References | () https://github.com/error311/FileRise/blob/7fee135a5b8feb25558aba0474bd6bb53943fc88/src/controllers/FileController.php#L4016-L4058 - Product | |
| References | () https://github.com/error311/FileRise/blob/7fee135a5b8feb25558aba0474bd6bb53943fc88/src/models/FileModel.php#L3146 - Product | |
| References | () https://github.com/error311/FileRise/releases/tag/v3.3.0 - Release Notes | |
| References | () https://github.com/error311/FileRise/security/advisories/GHSA-h8fw-42v6-gfhv - Exploit, Vendor Advisory | |
| First Time |
Filerise
Filerise filerise |
09 Feb 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 20:15
Updated : 2026-02-19 20:02
NVD link : CVE-2026-25230
Mitre link : CVE-2026-25230
CVE.ORG link : CVE-2026-25230
JSON object : View
Products Affected
filerise
- filerise
