CVE-2025-53826

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser’s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist.
Configurations

Configuration 1 (hide)

cpe:2.3:a:filebrowser:filebrowser:2.39.0:*:*:*:*:*:*:*

History

05 Aug 2025, 18:26

Type Values Removed Values Added
First Time Filebrowser filebrowser
Filebrowser
CPE cpe:2.3:a:filebrowser:filebrowser:2.39.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/filebrowser/filebrowser/issues/5216 - () https://github.com/filebrowser/filebrowser/issues/5216 - Issue Tracking
References () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-7xwp-2cpp-p8r7 - () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-7xwp-2cpp-p8r7 - Exploit, Vendor Advisory

15 Jul 2025, 20:07

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-15 18:15

Updated : 2025-08-05 18:26


NVD link : CVE-2025-53826

Mitre link : CVE-2025-53826

CVE.ORG link : CVE-2025-53826


JSON object : View

Products Affected

filebrowser

  • filebrowser
CWE
CWE-305

Authentication Bypass by Primary Weakness

CWE-385

Covert Timing Channel

CWE-613

Insufficient Session Expiration