Description
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. In versions 2.61.2 and below, the TUS resumable upload handler parses the Upload-Length header as a signed 64-bit integer without validating that the value is non-negative, allowing an authenticated user to supply a negative value that instantly satisfies the upload completion condition upon the first PATCH request. This causes the server to fire after_upload exec hooks with empty or partial files, enabling an attacker to repeatedly trigger any configured hook with arbitrary filenames and zero bytes written. The impact ranges from DoS through expensive processing hooks, to command injection amplification when combined with malicious filenames, to abuse of upload-driven workflows like S3 ingestion or database inserts. Even without exec hooks enabled, the negative Upload-Length creates inconsistent cache entries where files are marked complete but contain no data. All deployments using the TUS upload endpoint (/api/tus) are affected, with the enableExec flag escalating the impact from cache inconsistency to remote command execution. At the time of publication, no patch or mitigation was available to address this issue.
Published: 2026-03-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution via execution hooks
Action: Assess Impact
AI Analysis

Impact

The TUS upload handler in File Browser parses the Upload-Length header as a signed 64‑bit integer without verifying that the value is non‑negative. An authenticated user can send a negative value in the first PATCH request, which causes the server to believe the upload is complete immediately. This triggers any configured post‑upload execution hooks with empty or partial files, allowing the attacker to repeatedly fire hooks with arbitrary filenames and zero bytes.“ The lack of validation also creates cache inconsistencies where files appear complete but contain no data, potentially disrupting workflows that rely on the upload status. Once execution hooks are enabled, the vulnerability can be leveraged for higher‑level attacks, such as command injection when malicious filenames are supplied, or to inject data into downstream systems like S3 or databases.

Affected Systems

All deployments of File Browser that expose the TUS upload endpoint (/api/tus) are affected. The vulnerability applies to the filebrowser:filebrowser product in any version 2.61.2 or older. All instances that use the enableExec flag to run custom hooks are at greater risk, while those that do not may still suffer from cache corruption and denial of service conditions.

Risk and Exploitability

The CVSS score is 5.3, indicating a moderate severity potential, while the EPSS score is below 1%, suggesting low current exploit probability. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access; an attacker who can authenticate to the File Browser API can craft the negative Upload-Length header to trigger hooks or corrupt the file cache. If the enableExec flag is used, the risk escalates from a service disruption to remote command execution or even broader data tampering, depending on what the hooks are configured to perform.

Generated by OpenCVE AI on March 23, 2026 at 18:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a fixed version of File Browser or apply the official patch when released.
  • Disable the enableExec feature or the execution hooks if they are not essential for your operations.
  • Add validation checks in your hook implementations to reject malicious or malformed filenames before executing commands.
  • Monitor upload logs for anomalous PATCH requests that contain negative or missing Upload-Length headers and investigate suspicious activity.

Generated by OpenCVE AI on March 23, 2026 at 18:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ffx7-75gc-jg7c File Browser TUS Negative Upload-Length Fires Post-Upload Hooks Prematurely
History

Mon, 23 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


Fri, 20 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Filebrowser
Filebrowser filebrowser
Vendors & Products Filebrowser
Filebrowser filebrowser

Fri, 20 Mar 2026 00:00:00 +0000

Type Values Removed Values Added
Description File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. In versions 2.61.2 and below, the TUS resumable upload handler parses the Upload-Length header as a signed 64-bit integer without validating that the value is non-negative, allowing an authenticated user to supply a negative value that instantly satisfies the upload completion condition upon the first PATCH request. This causes the server to fire after_upload exec hooks with empty or partial files, enabling an attacker to repeatedly trigger any configured hook with arbitrary filenames and zero bytes written. The impact ranges from DoS through expensive processing hooks, to command injection amplification when combined with malicious filenames, to abuse of upload-driven workflows like S3 ingestion or database inserts. Even without exec hooks enabled, the negative Upload-Length creates inconsistent cache entries where files are marked complete but contain no data. All deployments using the TUS upload endpoint (/api/tus) are affected, with the enableExec flag escalating the impact from cache inconsistency to remote command execution. At the time of publication, no patch or mitigation was available to address this issue.
Title File Browser TUS Negative Upload-Length Fires Post-Upload Hooks Prematurely
Weaknesses CWE-190
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L'}


Subscriptions

Filebrowser Filebrowser
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T16:48:15.600Z

Reserved: 2026-03-13T18:53:03.532Z

Link: CVE-2026-32759

cve-icon Vulnrichment

Updated: 2026-03-20T16:48:00.247Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T00:16:17.270

Modified: 2026-03-23T16:54:09.273

Link: CVE-2026-32759

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:10:32Z

Weaknesses