VYPR
High severityNVD Advisory· Published Mar 5, 2026· Updated Mar 6, 2026

File Browser: Path Traversal in Public Share Links Exposes Files Outside Shared Directory

CVE-2026-28492

Description

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.0, when a user creates a public share link for a directory, the withHashFile middleware in http/public.go uses filepath.Dir(link.Path) to compute the BasePathFs root. This sets the filesystem root to the parent directory instead of the shared directory itself, allowing anyone with the share link to browse and download files from all sibling directories. This issue has been patched in version 2.61.0.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/filebrowser/filebrowser/v2Go
< 2.61.02.61.0

Affected products

1

Patches

1
31194fb57a5b

fix: correctly clean path

https://github.com/filebrowser/filebrowserHenrique DiasFeb 28, 2026via ghsa
1 file changed · +1 1
  • http/public.go+1 1 modified
    @@ -56,7 +56,7 @@ var withHashFile = func(fn handleFunc) handleFunc {
     		filePath := ""
     
     		if file.IsDir {
    -			basePath = filepath.Dir(basePath)
    +			basePath = filepath.Clean(link.Path)
     			filePath = ifPath
     		}
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.