VYPR
High severityNVD Advisory· Published Mar 10, 2026· Updated Mar 10, 2026

FileBrowser Quantum: Stored XSS in public share page via unsanitized share metadata (text/template misuse)

CVE-2026-30934

Description

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, Stored XSS is possible via share metadata fields (e.g., title, description) that are rendered into HTML for /public/share/ without context-aware escaping. The server uses text/template instead of html/template, allowing injected scripts to execute when victims visit the share URL. This vulnerability is fixed in 1.3.1-beta and 1.2.2-stable.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in FileBrowser Quantum via share metadata due to text/template misuse, allowing script execution on public share pages.

Vulnerability

CVE-2026-30934 is a stored cross-site scripting (XSS) vulnerability in FileBrowser Quantum, a self-hosted web file manager. Prior to versions 1.3.1-beta and 1.2.2-stable, the application uses text/template instead of html/template when rendering share metadata fields (e.g., title, description) into the public share page at /public/share/. This means user-controlled input is not contextually HTML-escaped, allowing an attacker to inject arbitrary JavaScript [1][3].

Exploitation

To exploit the vulnerability, an attacker must have permission to create shares. They can craft a share with malicious payloads in the metadata fields (e.g., ``). Once the share is saved, the payload is stored and executed in the browser of any user—including unauthenticated visitors—who opens the corresponding share URL [3]. No additional user interaction beyond visiting the link is required.

Impact

Successful exploitation enables arbitrary script execution in the context of the application's origin. This can lead to session hijacking, credential theft, data exfiltration, or performing actions on behalf of the victim, potentially compromising the entire application [2][3].

Mitigation

The vulnerability is fixed in versions 1.3.1-beta and 1.2.2-stable. Users should upgrade immediately. The fix replaces text/template with html/template to ensure proper context-aware escaping [1][4]. No workarounds are mentioned.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/gtsteffaniak/filebrowserGo
< 0.0.0-20260307130210-09713b32a5f60.0.0-20260307130210-09713b32a5f6

Affected products

2
  • Range: <1.3.1-beta, <1.2.2-stable
  • gtsteffaniak/filebrowserv5
    Range: >= 1.3.0-beta, < 1.3.1-beta

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.