Description
FileRise is a self-hosted web file manager / WebDAV server. Prior to 3.3.0, an HTML Injection vulnerability allows an authenticated user to modify the DOM and add e.g. form elements that call certain endpoints or link elements that redirect the user on active interaction. This vulnerability is fixed in 3.3.0.
Published: 2026-02-09
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authenticated DOM-based XSS
Action: Apply Patch
AI Analysis

Impact

The vulnerability is an authenticated DOM‐based HTML Injection that lets a logged‑in user inject arbitrary markup into file tag attributes. This can be used to add form elements that call backend endpoints or create links that redirect users; whether this could lead to privilege escalation or phishing is an inference and not explicitly stated in the vendor's description. The flaw arises from improper handling of the color property and falls under CWE‑116 and CWE‑79. Because it requires authentication, it does not pose a purely remote threat but users can leverage it to move laterally within the application.

Affected Systems

The issue affects the FileRise self‑hosted web file manager / WebDAV server from the error311 vendor. Versions prior to 3.3.0 are vulnerable; version 3.3.0 and later include the fix. The affected product is FileRise from error311.

Risk and Exploitability

The CVSS base score is 4.6, indicating low to moderate severity. The EPSS score is less than 1%, suggesting a very small likelihood of exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog. Attackers must be authenticated to the application. Once authenticated, they can modify the DOM and potentially trigger calls to internal endpoints or redirect users, which may enable further attacks such as phishing; whether privilege escalation could occur is an inference. Given the low EPSS and lack of known public exploits, the immediate risk is moderate but should still be mitigated promptly.

Generated by OpenCVE AI on April 18, 2026 at 18:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FileRise to version 3.3.0 or later to eliminate the HTML injection flaw.
  • Restrict or remove authentication credentials of users that do not require access to the file manager, limiting the attack surface for authenticated exploitation.
  • Implement strict input validation on the color attribute to allow only hexadecimal color codes and strip any embedded HTML tags, thereby neutralizing injection attempts.

Generated by OpenCVE AI on April 18, 2026 at 18:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Filerise
Filerise filerise
CPEs cpe:2.3:a:filerise:filerise:*:*:*:*:*:*:*:*
Vendors & Products Filerise
Filerise filerise

Tue, 10 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Error311
Error311 filerise
Vendors & Products Error311
Error311 filerise

Mon, 09 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description FileRise is a self-hosted web file manager / WebDAV server. Prior to 3.3.0, an HTML Injection vulnerability allows an authenticated user to modify the DOM and add e.g. form elements that call certain endpoints or link elements that redirect the user on active interaction. This vulnerability is fixed in 3.3.0.
Title FileRise affected by HTML Injection using color property in file tags
Weaknesses CWE-116
CWE-79
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L'}


Subscriptions

Error311 Filerise
Filerise Filerise
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-10T16:01:32.571Z

Reserved: 2026-01-30T14:44:47.328Z

Link: CVE-2026-25230

cve-icon Vulnrichment

Updated: 2026-02-10T15:30:28.923Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T20:15:56.700

Modified: 2026-02-19T20:02:58.807

Link: CVE-2026-25230

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:30:07Z

Weaknesses