CVE-2026-35605

File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the Matches() function in rules/rules.go uses strings.HasPrefix() without a trailing directory separator when matching paths against access rules. A rule for /uploads also matches /uploads_backup/, granting or denying access to unintended directories. This vulnerability is fixed in 2.63.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*

History

16 Apr 2026, 18:23

Type Values Removed Values Added
First Time Filebrowser
Filebrowser filebrowser
CPE cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*
References () https://github.com/filebrowser/filebrowser/pull/5889 - () https://github.com/filebrowser/filebrowser/pull/5889 - Patch
References () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-5q48-q4fm-g3m6 - () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-5q48-q4fm-g3m6 - Exploit, Vendor Advisory

09 Apr 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

07 Apr 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-07 17:16

Updated : 2026-04-16 18:23


NVD link : CVE-2026-35605

Mitre link : CVE-2026-35605

CVE.ORG link : CVE-2026-35605


JSON object : View

Products Affected

filebrowser

  • filebrowser
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')