Impact
File Browser, a file management interface, contains an access control flaw in the resourceGetHandler of http/resource.go. Before version 2.63.1 this handler delivers the full text of any file located in the configured directory, bypassing the Perm.Download permission check. An attacker with a user account that has download: false can read arbitrary text files within their permitted scope, constituting a confidentiality breach and is classified as CWE‑862 Access Control Failure.
Affected Systems
The vulnerability affects the File Browser product (identified as filebrowser:filebrowser). All releases prior to version 2.63.1 are vulnerable. The flaw is present in the /api/resources endpoint when requesting text file content. Upgrading to 2.63.1 or later removes the bypass by enforcing the download permission on all content‑serving paths.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate severity, with EPSS data unavailable and no inclusion in CISA’s KEV catalog. The attack vector is network‑based; an attacker who authenticates to the File Browser instance and possesses a user identity lacking download permission can issue a simple HTTP GET to /api/resources and obtain the file body. No privilege escalation or remote code execution is needed, but the confidentiality impact can be significant for sensitive directories.
OpenCVE Enrichment
Github GHSA