Description
FileRise is a self-hosted web file manager / WebDAV server. From version 1.0.1 to before version 3.10.0, the resumableIdentifier parameter in the Resumable.js chunked upload handler (UploadModel::handleUpload()) is concatenated directly into filesystem paths without any sanitization. An authenticated user with upload permission can exploit this to write files to arbitrary directories on the server, delete arbitrary directories via the post-assembly cleanup, and probe file/directory existence. This issue has been patched in version 3.10.0.
Published: 2026-03-24
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file write, directory deletion, and existence detection
Action: Immediate Patch
AI Analysis

Impact

A path traversal flaw in the resumableIdentifier parameter of FileRise’s Resumable.js upload handler allows an authenticated user to craft upload requests that cause the server to write data to any filesystem location, delete arbitrary directories during post‑assembly cleanup, and probe for the existence of files or directories. The issue is a classic directory traversal (CWE‑22) and insecure file handling (CWE‑73) that can result in significant data loss or corruption and could potentially be leveraged to gain further destructive capabilities within the server environment.

Affected Systems

FileRise, versions from 1.0.1 through any release prior to 3.10.0, are affected. Users deploying the self‑hosted web file manager without upgrading past the 3.10.0 release are at risk. The vulnerability exists in the default Resumable.js implementation in the UploadModel::handleUpload() component.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity, while the EPSS score of less than 1% suggests current exploitation risk is low, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated account with upload permission; the attacker must submit a crafted multipart request to the upload endpoint. No elevated privileges are required beyond normal user rights but the impact is confined to the file system of the hosting host.

Generated by OpenCVE AI on March 26, 2026 at 14:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FileRise to version 3.10.0 or newer.

Generated by OpenCVE AI on March 26, 2026 at 14:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Filerise
Filerise filerise
CPEs cpe:2.3:a:filerise:filerise:*:*:*:*:*:*:*:*
Vendors & Products Filerise
Filerise filerise

Wed, 25 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Error311
Error311 filerise
Vendors & Products Error311
Error311 filerise

Tue, 24 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description FileRise is a self-hosted web file manager / WebDAV server. From version 1.0.1 to before version 3.10.0, the resumableIdentifier parameter in the Resumable.js chunked upload handler (UploadModel::handleUpload()) is concatenated directly into filesystem paths without any sanitization. An authenticated user with upload permission can exploit this to write files to arbitrary directories on the server, delete arbitrary directories via the post-assembly cleanup, and probe file/directory existence. This issue has been patched in version 3.10.0.
Title FileRise: Path Traversal in `resumableIdentifier` Leading to Arbitrary File Write, Recursive Directory Deletion, and Limited Existence Oracle
Weaknesses CWE-22
CWE-73
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Error311 Filerise
Filerise Filerise
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-25T16:20:07.262Z

Reserved: 2026-03-18T21:23:36.678Z

Link: CVE-2026-33329

cve-icon Vulnrichment

Updated: 2026-03-25T16:20:01.149Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T20:16:28.217

Modified: 2026-03-26T11:59:50.703

Link: CVE-2026-33329

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:20:40Z

Weaknesses