File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Versions 2.61.2 and below are vulnerable to Path Traversal through the resourcePatchHandler (http/resource.go). The destination path in resourcePatchHandler is validated against access rules before being cleaned/normalized, while the actual file operation calls path.Clean() afterward—resolving .. sequences into a different effective path. This allows an authenticated user with Create or Rename permissions to bypass administrator-configured deny rules (both prefix-based and regex-based) by injecting .. sequences in the destination parameter of a PATCH request. As a result, the user can write or move files into any deny-rule-protected path within their scope. However, this cannot be used to escape the user's BasePathFs scope or read from restricted paths. This issue has been fixed in version 2.62.0.
References
| Link | Resource |
|---|---|
| https://github.com/filebrowser/filebrowser/commit/4bd7d69c82163b201a987e99c0c50d7ecc6ee5f1 | Patch |
| https://github.com/filebrowser/filebrowser/releases/tag/v2.62.0 | Product Release Notes |
| https://github.com/filebrowser/filebrowser/security/advisories/GHSA-9f3r-2vgw-m8xp | Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-20 00:16
Updated : 2026-03-23 16:55
NVD link : CVE-2026-32758
Mitre link : CVE-2026-32758
CVE.ORG link : CVE-2026-32758
JSON object : View
Products Affected
filebrowser
- filebrowser
