icon

We found results for “

CVE-2025-52901

Good to know:

icon

Date: June 30, 2025

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.9, access tokens are used as GET parameters. The JSON Web Token (JWT) which is used as a session identifier will get leaked to anyone having access to the URLs accessed by the user. This will give an attacker full access to a user's account and, in consequence, to all sensitive files the user has access to. This issue has been patched in version 2.33.9.

Severity Score

Severity Score

Weakness Type (CWE)

Use of GET Request Method With Sensitive Query Strings

CWE-598

Top Fix

icon

Upgrade Version

Upgrade to version github.com/filebrowser/filebrowser - v2.33.9;github.com/filebrowser/filebrowser/v2 - v2.33.9

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): ADJACENT_NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): HIGH
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us