๐Ÿ” CVE Alert

CVE-2026-34530

MEDIUM 6.9

File Browser is vulnerable to Stored Cross-Site Scripting via text/template branding injection

CVSS Score
6.9
EPSS Score
0.1%
EPSS Percentile
18th

File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the SPA index page in File Browser is vulnerable to Stored Cross-Site Scripting (XSS) via admin-controlled branding fields. An admin who sets branding.name to a malicious payload injects persistent JavaScript that executes for ALL visitors, including unauthenticated users. This issue has been patched in version 2.62.2.

CWE CWE-79
Vendor filebrowser
Product filebrowser
Published Apr 1, 2026
Last Updated Apr 4, 2026
Stay Ahead of the Next One

Get instant alerts for filebrowser filebrowser

Be the first to know when new medium vulnerabilities affecting filebrowser filebrowser are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None

Affected Versions

filebrowser / filebrowser
< 2.62.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/filebrowser/filebrowser/security/advisories/GHSA-xfqj-3vmx-63wv github.com: https://github.com/filebrowser/filebrowser/releases/tag/v2.62.2