File Browser Self Registration Grants Any User Admin Access When Default Permissions Include Admin
Description
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. In versions 2.61.2 and below, any unauthenticated visitor can register a full administrator account when self-registration (signup = true) is enabled and the default user permissions have perm.admin = true. The signup handler blindly applies all default settings (including Perm.Admin) to the new user without any server-side guard that strips admin from self-registered accounts. The signupHandler is supposed to create unprivileged accounts for new visitors. It contains no explicit user.Perm.Admin = false reset after applying defaults. If an administrator (intentionally or accidentally) configures defaults.perm.admin = true and also enables signup, every account created via the public registration endpoint is an administrator with full control over all files, users, and server settings. This issue has been resolved in version 2.62.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/filebrowser/filebrowser/v2Go | < 2.62.0 | 2.62.0 |
Affected products
1- Range: < 2.62.0
Patches
1a63573b67eb3fix: signup handler shouldn't create admins
1 file changed · +4 −0
http/auth.go+4 −0 modified@@ -167,6 +167,10 @@ var signupHandler = func(_ http.ResponseWriter, r *http.Request, d *data) (int, d.settings.Defaults.Apply(user) + // Users signed up via the signup handler should never become admins, even + // if that is the default permission. + user.Perm.Admin = false + pwd, err := users.ValidateAndHashPwd(info.Password, d.settings.MinimumPasswordLength) if err != nil { return http.StatusBadRequest, err
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-5gg9-5g7w-hm73ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-32760ghsaADVISORY
- github.com/filebrowser/filebrowser/commit/a63573b67eb302167b4c4f218361a2d0c138deabghsax_refsource_MISCWEB
- github.com/filebrowser/filebrowser/releases/tag/v2.62.0ghsax_refsource_MISCWEB
- github.com/filebrowser/filebrowser/security/advisories/GHSA-5gg9-5g7w-hm73ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.