CVE-2026-33072

FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.9.0, a hardcoded default encryption key (default_please_change_this_key) is used for all cryptographic operations — HMAC token generation, AES config encryption, and session tokens — allowing any unauthenticated attacker to forge upload tokens for arbitrary file upload to shared folders, and to decrypt admin configuration secrets including OIDC client secrets and SMTP passwords. FileRise uses a single key (PERSISTENT_TOKENS_KEY) for all crypto operations. The default value default_please_change_this_key is hardcoded in two places and used unless the deployer explicitly overrides the environment variable. This issue is fixed in version 3.9.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:filerise:filerise:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-20 09:16

Updated : 2026-03-23 15:53


NVD link : CVE-2026-33072

Mitre link : CVE-2026-33072

CVE.ORG link : CVE-2026-33072


JSON object : View

Products Affected

filerise

  • filerise
CWE
CWE-798

Use of Hard-coded Credentials

CWE-1188

Initialization of a Resource with an Insecure Default