Low severityNVD Advisory· Published Jun 30, 2025· Updated Aug 4, 2025
File Browser's Password Protection of Links Vulnerable to Bypass
CVE-2025-52996
Description
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In versions 2.32.0 and prior, the implementation of password protected links is error-prone, resulting in potential unprotected sharing of a file through a direct download link. This link can either be shared unknowingly by a user or discovered from various locations such as the browser history or the log of a proxy server used. At time of publication, no known patched versions are available.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/filebrowser/filebrowser/v2Go | <= 2.42.1 | — |
github.com/filebrowser/filebrowserGo | <= 1.11.0 | — |
Affected products
1- Range: <= 2.32.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-3v48-283x-f2w4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-52996ghsaADVISORY
- github.com/filebrowser/filebrowser/issues/5239ghsax_refsource_MISCWEB
- github.com/filebrowser/filebrowser/security/advisories/GHSA-3v48-283x-f2w4ghsax_refsource_CONFIRMWEB
- github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250327-02_Filebrowser_Password_Protection_Of_Links_Bypassableghsax_refsource_MISCWEB
- pkg.go.dev/vuln/GO-2025-3790ghsaWEB
News mentions
0No linked articles in our index yet.