CVE-2026-34530

File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the SPA index page in File Browser is vulnerable to Stored Cross-Site Scripting (XSS) via admin-controlled branding fields. An admin who sets branding.name to a malicious payload injects persistent JavaScript that executes for ALL visitors, including unauthenticated users. This issue has been patched in version 2.62.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*

History

06 Apr 2026, 20:34

Type Values Removed Values Added
CPE cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*
References () https://github.com/filebrowser/filebrowser/releases/tag/v2.62.2 - () https://github.com/filebrowser/filebrowser/releases/tag/v2.62.2 - Product, Release Notes
References () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-xfqj-3vmx-63wv - () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-xfqj-3vmx-63wv - Exploit, Vendor Advisory
First Time Filebrowser
Filebrowser filebrowser

01 Apr 2026, 21:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-01 21:17

Updated : 2026-04-06 20:34


NVD link : CVE-2026-34530

Mitre link : CVE-2026-34530

CVE.ORG link : CVE-2026-34530


JSON object : View

Products Affected

filebrowser

  • filebrowser
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')