Description
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the Matches() function in rules/rules.go uses strings.HasPrefix() without a trailing directory separator when matching paths against access rules. A rule for /uploads also matches /uploads_backup/, granting or denying access to unintended directories. This vulnerability is fixed in 2.63.1.
Published: 2026-04-07
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized directory access via access rule bypass
Action: Immediate Patch
AI Analysis

Impact

The vulnerability stems from the Matches() function in File Browser’s access rule logic, which uses a simple prefix check without a trailing separator. This flaw allows an attacker to craft a path that starts with a permitted directory prefix yet points to an adjacent directory, thereby bypassing intended restrictions. In practice, a rule granting or denying access to "/uploads" may inadvertently apply to "/uploads_backup" or other similarly prefixed directories, leading to unauthorized read, write, or other file operations. The weakness is a classic path traversal scenario. Because the affected functionality exposes file management operations, a successful exploit could compromise confidentiality, integrity, and availability of the underlying file system for the compromised domain.

Affected Systems

The issue impacts the File Browser application under the vendor "filebrowser". Versions earlier than 2.63.1 are affected. Upgrading to 2.63.1 or later resolves the path matching bug.

Risk and Exploitability

With a CVSS score of 6.3, the vulnerability presents moderate severity. Although no EPSS score is available, the lack of a KEV listing suggests it may not yet be widely exploited. An attacker would likely need to send crafted HTTP requests to paths that trigger the flawed prefix check; the attack could be carried out remotely through the web interface. The specific conditions required are typical of web‑based file handling systems and thus are probable in exposed deployments. As no official workaround is cited, mitigation relies on patching the application.

Generated by OpenCVE AI on April 7, 2026 at 23:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade File Browser to version 2.63.1 or later

Generated by OpenCVE AI on April 7, 2026 at 23:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5q48-q4fm-g3m6 File Browser has an access rule bypass via HasPrefix without trailing separator in path matching
History

Thu, 16 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*

Thu, 09 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Filebrowser
Filebrowser filebrowser
Vendors & Products Filebrowser
Filebrowser filebrowser

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the Matches() function in rules/rules.go uses strings.HasPrefix() without a trailing directory separator when matching paths against access rules. A rule for /uploads also matches /uploads_backup/, granting or denying access to unintended directories. This vulnerability is fixed in 2.63.1.
Title File Browser has an access rule bypass via HasPrefix without trailing separator in path matching
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Filebrowser Filebrowser
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-09T14:32:02.764Z

Reserved: 2026-04-03T21:25:12.162Z

Link: CVE-2026-35605

cve-icon Vulnrichment

Updated: 2026-04-09T14:31:57.643Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T17:16:34.583

Modified: 2026-04-16T18:23:47.467

Link: CVE-2026-35605

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:47:57Z

Weaknesses