File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the SPA index page in File Browser is vulnerable to Stored Cross-Site Scripting (XSS) via admin-controlled branding fields. An admin who sets branding.name to a malicious payload injects persistent JavaScript that executes for ALL visitors, including unauthenticated users. This issue has been patched in version 2.62.2.
References
| Link | Resource |
|---|---|
| https://github.com/filebrowser/filebrowser/releases/tag/v2.62.2 | Product Release Notes |
| https://github.com/filebrowser/filebrowser/security/advisories/GHSA-xfqj-3vmx-63wv | Exploit Vendor Advisory |
Configurations
History
06 Apr 2026, 20:34
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:* | |
| References | () https://github.com/filebrowser/filebrowser/releases/tag/v2.62.2 - Product, Release Notes | |
| References | () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-xfqj-3vmx-63wv - Exploit, Vendor Advisory | |
| First Time |
Filebrowser
Filebrowser filebrowser |
01 Apr 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-01 21:17
Updated : 2026-04-06 20:34
NVD link : CVE-2026-34530
Mitre link : CVE-2026-34530
CVE.ORG link : CVE-2026-34530
JSON object : View
Products Affected
filebrowser
- filebrowser
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
