File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the Matches() function in rules/rules.go uses strings.HasPrefix() without a trailing directory separator when matching paths against access rules. A rule for /uploads also matches /uploads_backup/, granting or denying access to unintended directories. This vulnerability is fixed in 2.63.1.
References
| Link | Resource |
|---|---|
| https://github.com/filebrowser/filebrowser/pull/5889 | Patch |
| https://github.com/filebrowser/filebrowser/security/advisories/GHSA-5q48-q4fm-g3m6 | Exploit Vendor Advisory |
Configurations
History
16 Apr 2026, 18:23
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Filebrowser
Filebrowser filebrowser |
|
| CPE | cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:* | |
| References | () https://github.com/filebrowser/filebrowser/pull/5889 - Patch | |
| References | () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-5q48-q4fm-g3m6 - Exploit, Vendor Advisory |
09 Apr 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
07 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-07 17:16
Updated : 2026-04-16 18:23
NVD link : CVE-2026-35605
Mitre link : CVE-2026-35605
CVE.ORG link : CVE-2026-35605
JSON object : View
Products Affected
filebrowser
- filebrowser
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
