CVE-2026-34530
File Browser is vulnerable to Stored Cross-Site Scripting via text/template branding injection
CVSS Score
6.9
EPSS Score
0.1%
EPSS Percentile
18th
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the SPA index page in File Browser is vulnerable to Stored Cross-Site Scripting (XSS) via admin-controlled branding fields. An admin who sets branding.name to a malicious payload injects persistent JavaScript that executes for ALL visitors, including unauthenticated users. This issue has been patched in version 2.62.2.
| CWE | CWE-79 |
| Vendor | filebrowser |
| Product | filebrowser |
| Published | Apr 1, 2026 |
| Last Updated | Apr 4, 2026 |
Stay Ahead of the Next One
Get instant alerts for filebrowser filebrowser
Be the first to know when new medium vulnerabilities affecting filebrowser filebrowser are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None
Affected Versions
filebrowser / filebrowser
< 2.62.2