VYPR
Critical severityNVD Advisory· Published Mar 5, 2026· Updated Mar 6, 2026

File Browser: TUS Delete Endpoint Bypasses Delete Permission Check

CVE-2026-29188

Description

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.1, a broken access control vulnerability in the TUS protocol DELETE endpoint allows authenticated users with only Create permission to delete arbitrary files and directories within their scope, bypassing the intended Delete permission restriction. Any multi-user deployment where administrators explicitly restrict file deletion for certain users is affected. This issue has been patched in version 2.61.1.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/filebrowser/filebrowser/v2Go
< 2.61.12.61.1

Affected products

1

Patches

1
7ed1425115be

fix: check for correct permission in TUS Delete

https://github.com/filebrowser/filebrowserHenrique DiasMar 4, 2026via ghsa
1 file changed · +1 1
  • http/tus_handlers.go+1 1 modified
    @@ -240,7 +240,7 @@ func tusPatchHandler(cache UploadCache) handleFunc {
     
     func tusDeleteHandler(cache UploadCache) handleFunc {
     	return withUser(func(_ http.ResponseWriter, r *http.Request, d *data) (int, error) {
    -		if r.URL.Path == "/" || !d.user.Perm.Create {
    +		if r.URL.Path == "/" || !d.user.Perm.Delete {
     			return http.StatusForbidden, nil
     		}
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.