CVE-2026-28492 — Sensitive Information Exposure in Filebrowser
Severity
7.1HIGHNVD
EPSS
0.0%
top 87.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 5
Latest updateMar 10
Description
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.0, when a user creates a public share link for a directory, the withHashFile middleware in http/public.go uses filepath.Dir(link.Path) to compute the BasePathFs root. This sets the filesystem root to the parent directory instead of the shared directory itself, allowing anyone with the share link to browse and download files from …
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Packages3 packages
Patches
🔴Vulnerability Details
4OSV▶
FileBrowser has Path Traversal in Public Share Links that Exposes Files Outside Shared Directory in github.com/filebrowser/filebrowser↗2026-03-10
CVEList▶
File Browser: Path Traversal in Public Share Links Exposes Files Outside Shared Directory↗2026-03-05
GHSA▶
FileBrowser has Path Traversal in Public Share Links that Exposes Files Outside Shared Directory↗2026-03-02
OSV▶
FileBrowser has Path Traversal in Public Share Links that Exposes Files Outside Shared Directory↗2026-03-02