CVE-2026-28492Sensitive Information Exposure in Filebrowser

Severity
7.1HIGHNVD
EPSS
0.0%
top 87.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 5
Latest updateMar 10

Description

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.0, when a user creates a public share link for a directory, the withHashFile middleware in http/public.go uses filepath.Dir(link.Path) to compute the BasePathFs root. This sets the filesystem root to the parent directory instead of the shared directory itself, allowing anyone with the share link to browse and download files from

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Packages3 packages

Patches

🔴Vulnerability Details

4
OSV
FileBrowser has Path Traversal in Public Share Links that Exposes Files Outside Shared Directory in github.com/filebrowser/filebrowser2026-03-10
CVEList
File Browser: Path Traversal in Public Share Links Exposes Files Outside Shared Directory2026-03-05
GHSA
FileBrowser has Path Traversal in Public Share Links that Exposes Files Outside Shared Directory2026-03-02
OSV
FileBrowser has Path Traversal in Public Share Links that Exposes Files Outside Shared Directory2026-03-02

🕵️Threat Intelligence

1
Wiz
CVE-2026-28492 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-28492 — Sensitive Information Exposure | cvebase