FileRise vulnerable to Cross-Site Scripting (XSS) in SVG File Handling
Description
FileRise is a self-hosted web file manager / WebDAV server. Versions prior to 2.7.1 are vulnerable to Stored Cross-Site Scripting (XSS) due to unsafe handling of browser-renderable user uploads when served through the sharing and download endpoints. An attacker who can get a crafted SVG (primary) or HTML (secondary) file stored in a FileRise instance can cause JavaScript execution when a victim opens a generated share link (and in some cases via the direct download endpoint). This impacts share links (/api/file/share.php) and direct file access / download path (/api/file/download.php), depending on browser/content-type behavior. Version 2.7.1 fixes the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/error311/FileRise/security/advisories/GHSA-35pp-ggh6-c59cmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.