๐Ÿ” CVE Alert

CVE-2026-35605

HIGH 7.5

File Browser has an access rule bypass via HasPrefix without trailing separator in path matching

CVSS Score
7.5
EPSS Score
0.1%
EPSS Percentile
20th

File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the Matches() function in rules/rules.go uses strings.HasPrefix() without a trailing directory separator when matching paths against access rules. A rule for /uploads also matches /uploads_backup/, granting or denying access to unintended directories. This vulnerability is fixed in 2.63.1.

CWE CWE-22
Vendor filebrowser
Product filebrowser
Published Apr 7, 2026
Last Updated Apr 9, 2026
Stay Ahead of the Next One

Get instant alerts for filebrowser filebrowser

Be the first to know when new high vulnerabilities affecting filebrowser filebrowser are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

filebrowser / filebrowser
< 2.63.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/filebrowser/filebrowser/security/advisories/GHSA-5q48-q4fm-g3m6 github.com: https://github.com/filebrowser/filebrowser/pull/5889