CVE-2026-34530Cross-site Scripting in Filebrowser

Severity
6.9MEDIUMNVD
EPSS
0.1%
top 80.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 1

Description

File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the SPA index page in File Browser is vulnerable to Stored Cross-Site Scripting (XSS) via admin-controlled branding fields. An admin who sets branding.name to a malicious payload injects persistent JavaScript that executes for ALL visitors, including unauthenticated users. This issue has been patched in version 2.62.2.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:NExploitability: 1.7 | Impact: 4.7

Affected Packages3 packages

🔴Vulnerability Details

3
CVEList
File Browser is vulnerable to Stored Cross-Site Scripting via text/template branding injection2026-04-01
GHSA
File Browser vulnerable to Stored Cross-site Scripting via text/template branding injection2026-03-31
OSV
File Browser vulnerable to Stored Cross-site Scripting via text/template branding injection2026-03-31

🕵️Threat Intelligence

1
Wiz
CVE-2026-34530 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-34530 — Cross-site Scripting in Filebrowser | cvebase