High severityNVD Advisory· Published Jul 15, 2025· Updated Jul 15, 2025
FileBrowser Has Insecure JWT Handling Which Allows Session Replay Attacks after Logout
CVE-2025-53826
Description
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser’s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/filebrowser/filebrowserGo | <= 2.39.0 | — |
github.com/filebrowser/filebrowser/v2Go | <= 2.39.0 | — |
Affected products
1- Range: = 2.39.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-7xwp-2cpp-p8r7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-53826ghsaADVISORY
- github.com/filebrowser/filebrowser/issues/5216ghsax_refsource_MISCWEB
- github.com/filebrowser/filebrowser/security/advisories/GHSA-7xwp-2cpp-p8r7ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.