Description
FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.8.0, a missing-authentication vulnerability in the deleteShareLink endpoint allows any unauthenticated user to delete arbitrary file share links by providing only the share token, causing denial of service to shared file access. The POST /api/file/deleteShareLink.php endpoint calls FileController::deleteShareLink() which performs no authentication, authorization, or CSRF validation before deleting a share link. Any anonymous HTTP client can destroy share links. This issue is fixed in version 3.8.0.
Published: 2026-03-20
Score: 3.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service to shared file access
Action: Patch
AI Analysis

Impact

A missing-authentication flaw in the deleteShareLink endpoint of FileRise allows an external attacker to send an unauthenticated HTTP POST request with a share token, causing the server to delete that share link. This action removes the link permanently, effectively preventing any user who relies on that link from accessing the shared file, which amounts to a denial of service for those shared resources.

Affected Systems

FileRise self-hosted web file manager and WebDAV server versions prior to 3.8.0 released by error311 are vulnerable. Attackers only need the share token to exploit the fault; no credentials or additional access are required.

Risk and Exploitability

The CVSS score of 3.7 indicates low severity, and an EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not in the CISA Known Exploited Vulnerabilities catalog. The weak security model (absence of authentication and validation) means that an attacker poses a low effort, high impact risk to any site running a vulnerable version.

Generated by OpenCVE AI on March 23, 2026 at 16:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update FileRise to version 3.8.0 or later.

Generated by OpenCVE AI on March 23, 2026 at 16:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Filerise
Filerise filerise
CPEs cpe:2.3:a:filerise:filerise:*:*:*:*:*:*:*:*
Vendors & Products Filerise
Filerise filerise

Fri, 20 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Error311
Error311 filerise
Vendors & Products Error311
Error311 filerise

Fri, 20 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
Description FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.8.0, a missing-authentication vulnerability in the deleteShareLink endpoint allows any unauthenticated user to delete arbitrary file share links by providing only the share token, causing denial of service to shared file access. The POST /api/file/deleteShareLink.php endpoint calls FileController::deleteShareLink() which performs no authentication, authorization, or CSRF validation before deleting a share link. Any anonymous HTTP client can destroy share links. This issue is fixed in version 3.8.0.
Title FileRise has Unauthenticated Share Link Deletion
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Error311 Filerise
Filerise Filerise
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-25T13:49:07.436Z

Reserved: 2026-03-17T19:27:06.343Z

Link: CVE-2026-33070

cve-icon Vulnrichment

Updated: 2026-03-25T13:48:57.676Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T09:16:15.347

Modified: 2026-03-23T15:33:39.733

Link: CVE-2026-33070

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:29:51Z

Weaknesses