CVE-2026-34530 — Cross-site Scripting in Filebrowser
Severity
6.9MEDIUMNVD
EPSS
0.1%
top 80.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 1
Description
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the SPA index page in File Browser is vulnerable to Stored Cross-Site Scripting (XSS) via admin-controlled branding fields. An admin who sets branding.name to a malicious payload injects persistent JavaScript that executes for ALL visitors, including unauthenticated users. This issue has been patched in version 2.62.2.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:NExploitability: 1.7 | Impact: 4.7
Affected Packages3 packages
🔴Vulnerability Details
3CVEList▶
File Browser is vulnerable to Stored Cross-Site Scripting via text/template branding injection↗2026-04-01
GHSA▶
File Browser vulnerable to Stored Cross-site Scripting via text/template branding injection↗2026-03-31
OSV▶
File Browser vulnerable to Stored Cross-site Scripting via text/template branding injection↗2026-03-31