CVE-2026-32758 — Path Traversal in Filebrowser
Severity
6.5MEDIUMNVD
EPSS
0.0%
top 97.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 20
Latest updateMar 26
Description
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Versions 2.61.2 and below are vulnerable to Path Traversal through the resourcePatchHandler (http/resource.go). The destination path in resourcePatchHandler is validated against access rules before being cleaned/normalized, while the actual file operation calls path.Clean() afterward—resolving .. sequences into a different effective path. This allows an authent…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6
Affected Packages3 packages
Patches
🔴Vulnerability Details
4OSV▶
File Browser has an Access Rule Bypass via Path Traversal in Copy/Rename Destination Parameter in github.com/filebrowser/filebrowser↗2026-03-26
CVEList▶
File Browser has an Access Rule Bypass via Path Traversal in Copy/Rename Destination Parameter↗2026-03-19
GHSA▶
File Browser has an Access Rule Bypass via Path Traversal in Copy/Rename Destination Parameter↗2026-03-16
OSV▶
File Browser has an Access Rule Bypass via Path Traversal in Copy/Rename Destination Parameter↗2026-03-16