CVE-2026-35605
File Browser has an access rule bypass via HasPrefix without trailing separator in path matching
CVSS Score
7.5
EPSS Score
0.1%
EPSS Percentile
20th
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the Matches() function in rules/rules.go uses strings.HasPrefix() without a trailing directory separator when matching paths against access rules. A rule for /uploads also matches /uploads_backup/, granting or denying access to unintended directories. This vulnerability is fixed in 2.63.1.
| CWE | CWE-22 |
| Vendor | filebrowser |
| Product | filebrowser |
| Published | Apr 7, 2026 |
| Last Updated | Apr 9, 2026 |
Stay Ahead of the Next One
Get instant alerts for filebrowser filebrowser
Be the first to know when new high vulnerabilities affecting filebrowser filebrowser are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
filebrowser / filebrowser
< 2.63.1