Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-52901
Modified
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-30 Jun, 2025 | 20:15
Updated At-04 Aug, 2025 | 18:15

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.9, access tokens are used as GET parameters. The JSON Web Token (JWT) which is used as a session identifier will get leaked to anyone having access to the URLs accessed by the user. This will give an attacker full access to a user's account and, in consequence, to all sensitive files the user has access to. This issue has been patched in version 2.33.9.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.5MEDIUM
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 4.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CPE Matches

filebrowser
filebrowser
>>filebrowser>>Versions up to 2.33.0(inclusive)
cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-598Secondarysecurity-advisories@github.com
CWE ID: CWE-598
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/filebrowser/filebrowser/commit/d5b39a14fd3fc0d1c364116b41289484df7c27b2security-advisories@github.com
Patch
https://github.com/filebrowser/filebrowser/releases/tag/v2.33.9security-advisories@github.com
Release Notes
https://github.com/filebrowser/filebrowser/security/advisories/GHSA-rmwh-g367-mj4xsecurity-advisories@github.com
Exploit
Vendor Advisory
https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250327-03_Filebrowser_Sensitive_Data_Transferred_In_URLsecurity-advisories@github.com
N/A
Hyperlink: https://github.com/filebrowser/filebrowser/commit/d5b39a14fd3fc0d1c364116b41289484df7c27b2
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/filebrowser/filebrowser/releases/tag/v2.33.9
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/filebrowser/filebrowser/security/advisories/GHSA-rmwh-g367-mj4x
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory
Hyperlink: https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250327-03_Filebrowser_Sensitive_Data_Transferred_In_URL
Source: security-advisories@github.com
Resource: N/A
Change History
0Changes found

Details not found