HomeFilebrowserCVE-2025-52901

CVE-2025-52901

MEDIUM
4.5CVSS
Published: 2025-06-30
Updated: 2025-08-04
AI Analysis

Description

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.9, access tokens are used as GET parameters. The JSON Web Token (JWT) which is used as a session identifier will get leaked to anyone having access to the URLs accessed by the user. This will give an attacker full access to a user's account and, in consequence, to all sensitive files the user has access to. This issue has been patched in version 2.33.9.

CVSS Metrics

Vector
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Attack Vector
adjacent network
Complexity
low
Privileges
high
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
none
Availability
none
Weaknesses
CWE-598

Metadata

Primary Vendor
FILEBROWSER
Published
6/30/2025
Last Modified
8/4/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

filebrowser : filebrowser

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-52901 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com