PT-2026-22992 · Unknown · Filebrowser
Uug4Na
·
Published
2026-03-02
·
Updated
2026-03-25
·
CVE-2026-28492
CVSS v4.0
7.1
High
| AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
File Browser versions prior to 2.61.0
Description
File Browser provides a file managing interface. A flaw exists where creating a public share link for a directory allows unauthorized access to sibling directories and their files. The
withHashFile middleware in http/public.go incorrectly uses filepath.Dir(link.Path) to determine the filesystem root, resulting in access to the parent directory instead of the intended shared directory. This impacts the /api/public/share/{hash} (directory listing) and /api/public/dl/{hash}/path (file download) API endpoints. The vulnerable parameter is link.Path. This issue allows unauthenticated information disclosure, enabling anyone with a share link to browse and download files from directories outside the intended share.Recommendations
Update File Browser to version 2.61.0 or later.
Exploit
Fix
Information Disclosure
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Filebrowser