Impact
File Browser enables management of files through a web interface. A bug in the signup process caused default user permissions to be applied without removing the Execute flag when the default user template is used. This leaves unauthenticated users who register new accounts with the ability to execute arbitrary commands on the hosting server, a high-impact privilege escalation flaw classified as CWE‑269.
Affected Systems
The flaw exists in all versions of File Browser earlier than v2.62.2 on any installation that has enabled the public signup option and configured the default user template with Execute=true.
Risk and Exploitability
The CVSS base score of 8.1 indicates a high severity level, but the EPSS of less than 1% suggests limited real-world exploitation. The vulnerability is not recorded in the CISA KEV catalog. An attacker can exploit the weakness by sending a normal registration request to a target where signup is allowed and command execution is enabled, creating an account that can subsequently run arbitrary shell commands on the server.
OpenCVE Enrichment
Github GHSA