File Browser: Path Traversal in Public Share Links Exposes Files Outside Shared Directory
Description
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.0, when a user creates a public share link for a directory, the withHashFile middleware in http/public.go uses filepath.Dir(link.Path) to compute the BasePathFs root. This sets the filesystem root to the parent directory instead of the shared directory itself, allowing anyone with the share link to browse and download files from all sibling directories. This issue has been patched in version 2.61.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/filebrowser/filebrowser/v2Go | < 2.61.0 | 2.61.0 |
Affected products
1- Range: < 2.61.0
Patches
131194fb57a5bfix: correctly clean path
1 file changed · +1 −1
http/public.go+1 −1 modified@@ -56,7 +56,7 @@ var withHashFile = func(fn handleFunc) handleFunc { filePath := "" if file.IsDir { - basePath = filepath.Dir(basePath) + basePath = filepath.Clean(link.Path) filePath = ifPath }
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-mr74-928f-rw69ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-28492ghsaADVISORY
- github.com/filebrowser/filebrowser/commit/31194fb57a5b92e7155219d7ec7273028fcb2e83ghsax_refsource_MISCWEB
- github.com/filebrowser/filebrowser/releases/tag/v2.61.0ghsax_refsource_MISCWEB
- github.com/filebrowser/filebrowser/security/advisories/GHSA-mr74-928f-rw69ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.