Medium severity6.9NVD Advisory· Published Apr 1, 2026· Updated Apr 6, 2026
CVE-2026-34530
CVE-2026-34530
Description
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the SPA index page in File Browser is vulnerable to Stored Cross-Site Scripting (XSS) via admin-controlled branding fields. An admin who sets branding.name to a malicious payload injects persistent JavaScript that executes for ALL visitors, including unauthenticated users. This issue has been patched in version 2.62.2.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/filebrowser/filebrowser/v2Go | < 2.62.2 | 2.62.2 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/filebrowser/filebrowser/security/advisories/GHSA-xfqj-3vmx-63wvnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-xfqj-3vmx-63wvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-34530ghsaADVISORY
- github.com/filebrowser/filebrowser/releases/tag/v2.62.2nvdProductRelease NotesWEB
News mentions
0No linked articles in our index yet.