FileBrowser Quantum Unauthenticated Information Disclosure Vulnerability
FileBrowser Quantum is susceptible to CVE-2026-46410, an unauthenticated information disclosure vulnerability, potentially exposing sensitive information such as source code and file paths.
FileBrowser Quantum, a web-based file manager, contains an information disclosure vulnerability (CVE-2026-46410) that can expose sensitive information to unauthorized users. This vulnerability affects versions prior to 1.2.1-stable.0.20260514154726-1802e1281135 and backend versions prior to 0.0.0-20260514154726-1802e1281135. An unauthenticated attacker can potentially access file paths and source code. This vulnerability can be exploited remotely due to a low attack complexity and no required user interaction. Defenders need to ensure their FileBrowser Quantum instances are up to date to prevent unauthorized information disclosure.
Attack Chain
- An unauthenticated attacker identifies a FileBrowser Quantum instance running a vulnerable version.
- The attacker crafts a specific HTTP request to a vulnerable endpoint.
- FileBrowser processes the request without proper authorization checks.
- The application retrieves sensitive file information (source code, paths).
- This information is unintentionally included in the HTTP response.
- The attacker parses the response to extract sensitive data.
- The attacker uses the disclosed information to gain further insights into the system’s configuration and potentially identify other vulnerabilities.
- The attacker uses the information for lateral movement or further exploitation.
Impact
Successful exploitation of CVE-2026-46410 allows an unauthenticated attacker to gain access to sensitive information, such as file paths and source code. This information can be leveraged to understand the system’s internal structure, identify other vulnerabilities, and potentially gain unauthorized access to sensitive files. The lack of integrity and availability impact metrics suggests the primary risk is related to data leakage rather than system disruption.
Recommendation
- Upgrade FileBrowser Quantum to the latest version to patch CVE-2026-46410.
- Implement the provided Sigma rule to detect suspicious requests targeting potential information disclosure endpoints.
- Monitor web server logs for unusual URI requests that could indicate exploitation attempts.
Detection coverage 2
Detects CVE-2026-46410 exploitation - FileBrowser Information Disclosure Attempt
highDetects attempts to exploit CVE-2026-46410 by identifying suspicious URI patterns that could lead to information disclosure in FileBrowser.
Detects CVE-2026-46410 exploitation - FileBrowser Sensitive File Request
mediumDetects CVE-2026-46410 exploitation — Monitors web server logs for requests to configuration files within FileBrowser Quantum that should not be publicly accessible.
Detection queries are available on the platform. Get full rules →