CVE-2026-25889

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to 2.57.1, a case-sensitivity flaw in the password validation logic allows any authenticated user to change their password (or an admin to change any user's password) without providing the current password. By using Title Case field name "Password" instead of lowercase "password" in the API request, the current_password verification is completely bypassed. This enables account takeover if an attacker obtains a valid JWT token through XSS, session hijacking, or other means. This vulnerability is fixed in 2.57.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*

History

23 Feb 2026, 17:55

Type Values Removed Values Added
References () https://github.com/filebrowser/filebrowser/commit/ff2f00498cff151e2fb1f5f0b16963bf33c3d6d4 - () https://github.com/filebrowser/filebrowser/commit/ff2f00498cff151e2fb1f5f0b16963bf33c3d6d4 - Patch
References () https://github.com/filebrowser/filebrowser/releases/tag/v2.57.1 - () https://github.com/filebrowser/filebrowser/releases/tag/v2.57.1 - Product, Release Notes
References () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-hxw8-4h9j-hq2r - () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-hxw8-4h9j-hq2r - Exploit, Mitigation, Vendor Advisory
Summary
  • (es) File Browser proporciona una interfaz de gestión de archivos dentro de un directorio especificado y puede ser utilizado para subir, eliminar, previsualizar, renombrar y editar archivos. Anterior a la 2.57.1, una falla de sensibilidad a mayúsculas y minúsculas en la lógica de validación de contraseñas permite a cualquier usuario autenticado cambiar su contraseña (o a un administrador cambiar la contraseña de cualquier usuario) sin proporcionar la contraseña actual. Al usar el nombre de campo en formato 'Title Case' 'Password' en lugar de 'password' en minúsculas en la solicitud de la API, la verificación de current_password es completamente eludida. Esto permite la toma de control de cuenta si un atacante obtiene un token JWT válido a través de XSS, secuestro de sesión, u otros medios. Esta vulnerabilidad está corregida en la 2.57.1.
First Time Filebrowser
Filebrowser filebrowser
CPE cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*

09 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-09 22:16

Updated : 2026-02-23 17:55


NVD link : CVE-2026-25889

Mitre link : CVE-2026-25889

CVE.ORG link : CVE-2026-25889


JSON object : View

Products Affected

filebrowser

  • filebrowser
CWE
CWE-178

Improper Handling of Case Sensitivity