FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.9.0, a hardcoded default encryption key (default_please_change_this_key) is used for all cryptographic operations — HMAC token generation, AES config encryption, and session tokens — allowing any unauthenticated attacker to forge upload tokens for arbitrary file upload to shared folders, and to decrypt admin configuration secrets including OIDC client secrets and SMTP passwords. FileRise uses a single key (PERSISTENT_TOKENS_KEY) for all crypto operations. The default value default_please_change_this_key is hardcoded in two places and used unless the deployer explicitly overrides the environment variable. This issue is fixed in version 3.9.0.
References
| Link | Resource |
|---|---|
| https://github.com/error311/FileRise/releases/tag/v3.9.0 | Product Release Notes |
| https://github.com/error311/FileRise/security/advisories/GHSA-f4xx-57cv-mg3x | Exploit Vendor Advisory |
| https://github.com/error311/FileRise/security/advisories/GHSA-f4xx-57cv-mg3x | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-20 09:16
Updated : 2026-03-23 15:53
NVD link : CVE-2026-33072
Mitre link : CVE-2026-33072
CVE.ORG link : CVE-2026-33072
JSON object : View
Products Affected
filerise
- filerise
