Description
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to 2.57.1, an authenticated user can bypass the application's "Disallow" file path rules by modifying the request URL. By adding multiple slashes (e.g., //private/) to the path, the authorization check fails to match the rule, while the underlying filesystem resolves the path correctly, granting unauthorized access to restricted files. This vulnerability is fixed in 2.57.1.
Published: 2026-02-09
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized file access
Action: Immediate patch
AI Analysis

Impact

The vulnerability arises from the way File Browser normalizes request URLs. When an authenticated user includes multiple leading slashes in the path, the application fails to match the configured 'Disallow' rules while the underlying filesystem still resolves the path. This mismatch allows the user to read or modify files located outside the intended directory, thereby violating the principle of least privilege and potentially exposing sensitive data. The flaw is a path‑based access control bypass, corresponding to CWE‑706 and CWE‑863.

Affected Systems

File Browser versions released prior to 2.57.1 are affected. The issue is present in every OS or infrastructure deployment that uses the default configuration, as the path normalization logic is independent of the host environment. Updating to any release equal to or greater than 2.57.1 removes the vulnerability, as the upstream project corrected the evaluation of path prefixes.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity, and the EPSS score of less than 1 % suggests a low but non‑zero probability of exploitation in the wild. The vulnerability requires authentication, so an attacker must first obtain valid credentials or access to an authorized session; no elevated privileges are necessary to succeed. The attack vector is a web request to the File Browser API or front‑end, where a double slash can be injected into the requested path. Because the flaw is not automatically exploited and is limited to authenticated users, the threat remains controlled but still significant for environments where users may have access to secure directories.

Generated by OpenCVE AI on April 17, 2026 at 21:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade File Browser to version 2.57.1 or newer.
  • Limit user roles to the least privilege necessary for their duties, ensuring that only authorized personnel can access restricted directories.
  • Configure the reverse proxy or web server to normalize URLs by collapsing or rejecting multiple leading slashes before the request reaches File Browser, effectively blocking the bypass path.

Generated by OpenCVE AI on April 17, 2026 at 21:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4mh3-h929-w968 File Browser has a Path-Based Access Control Bypass via Multiple Leading Slashes in URL
History

Fri, 20 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Filebrowser
Filebrowser filebrowser
Vendors & Products Filebrowser
Filebrowser filebrowser

Mon, 09 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
Description File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to 2.57.1, an authenticated user can bypass the application's "Disallow" file path rules by modifying the request URL. By adding multiple slashes (e.g., //private/) to the path, the authorization check fails to match the rule, while the underlying filesystem resolves the path correctly, granting unauthorized access to restricted files. This vulnerability is fixed in 2.57.1.
Title File Browser has a Path-Based Access Control Bypass via Multiple Leading Slashes in URL
Weaknesses CWE-706
CWE-863
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Filebrowser Filebrowser
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-10T15:57:52.236Z

Reserved: 2026-02-06T21:08:39.130Z

Link: CVE-2026-25890

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T22:16:03.873

Modified: 2026-02-20T20:31:02.080

Link: CVE-2026-25890

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:15:27Z

Weaknesses