Description
FileRise is a self-hosted web file manager / WebDAV server. Versions prior to 3.3.0, the application contains an unauthenticated file read vulnerability due to the lack of access control on the /uploads directory. Files uploaded to this directory can be accessed directly by any user who knows or can guess the file path, without requiring authentication. As a result, sensitive data could be exposed, and privacy may be breached. This vulnerability is fixed in 3.3.0.
Published: 2026-02-09
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated File Read
Action: Immediate Patch
AI Analysis

Impact

A flaw in the FileRise web file manager allows any user, even without authentication, to read files stored in the /uploads directory simply by knowing or guessing the URL path. Because there is no access control on that directory, the attacker can expose sensitive documents and personal data, resulting in a breach of confidentiality and potential privacy violations.

Affected Systems

The vulnerability affects all deployments of FileRise versions earlier than 3.3.0. Users running the self‑hosted web file manager or WebDAV server before this release are at risk.

Risk and Exploitability

The CVSS base score is 7.5, classifying the issue as high severity. An EPSS score lower than 1% indicates a very low probability of exploitation in the wild, and the flaw is not recorded in the CISA KEV catalog. An attacker can exploit the weakness by issuing a simple HTTP GET request to /uploads/<filename> without providing credentials, making the attack straightforward once the path is discovered or guessed.

Generated by OpenCVE AI on April 17, 2026 at 21:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FileRise to version 3.3.0 or newer, which implements proper access control on the uploads directory.
  • Configure the web server or FileRise settings to deny unauthenticated access to the /uploads directory (for example, by using .htaccess rules, IP whitelisting, or filesystem permissions).
  • Validate and sanitize all uploaded filenames and paths to restrict them to an allowed set, preventing attackers from guessing or crafting URLs to sensitive files.

Generated by OpenCVE AI on April 17, 2026 at 21:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Filerise
Filerise filerise
CPEs cpe:2.3:a:filerise:filerise:*:*:*:*:*:*:*:*
Vendors & Products Filerise
Filerise filerise

Tue, 10 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Error311
Error311 filerise
Vendors & Products Error311
Error311 filerise

Mon, 09 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description FileRise is a self-hosted web file manager / WebDAV server. Versions prior to 3.3.0, the application contains an unauthenticated file read vulnerability due to the lack of access control on the /uploads directory. Files uploaded to this directory can be accessed directly by any user who knows or can guess the file path, without requiring authentication. As a result, sensitive data could be exposed, and privacy may be breached. This vulnerability is fixed in 3.3.0.
Title FileRise affected by an Unauthenticated File Read Due to Insufficient Access Control
Weaknesses CWE-284
CWE-552
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Error311 Filerise
Filerise Filerise
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-10T16:01:25.905Z

Reserved: 2026-01-30T14:44:47.328Z

Link: CVE-2026-25231

cve-icon Vulnrichment

Updated: 2026-02-10T15:39:56.020Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T20:15:56.863

Modified: 2026-02-19T19:31:59.170

Link: CVE-2026-25231

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:30:28Z

Weaknesses