<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Filebrowser — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/filebrowser/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 03:28:06 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/filebrowser/feed.xml" rel="self" type="application/rss+xml"/><item><title>FileBrowser Public Share DELETE API Path Traversal Allows Arbitrary File Deletion</title><link>https://feed.craftedsignal.io/briefs/2026-05-filebrowser-path-traversal/</link><pubDate>Thu, 07 May 2026 03:28:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-filebrowser-path-traversal/</guid><description>A path traversal vulnerability exists in FileBrowser's public share DELETE API allowing unauthenticated attackers with valid share hashes and delete permissions to delete arbitrary files outside the shared directory, leading to unauthorized data loss and potential service disruption.</description><content:encoded><![CDATA[<p>FileBrowser, a web-based file manager, contains a critical path traversal vulnerability in its public share DELETE API. This flaw, present in versions prior to commit 112740bdd41d (May 1, 2026), allows an unauthenticated attacker to delete arbitrary files outside the intended shared directory. The vulnerability stems from insufficient sanitization of the &lsquo;path&rsquo; parameter in the API request. An attacker possessing a valid public share hash with delete permissions enabled can manipulate the &lsquo;path&rsquo; parameter using traversal sequences (e.g., ../) to escape the shared directory and delete files within the share owner&rsquo;s configured storage scope. This issue affects both stable and development versions of FileBrowser, making it a significant risk for users who rely on the public share feature with delete permissions enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a FileBrowser instance with public shares enabled and delete permissions granted on at least one share.</li>
<li>The attacker obtains a valid public share hash for a specific shared directory.</li>
<li>The attacker crafts a malicious DELETE request to the <code>/public/api/resources</code> endpoint (for stable versions) or <code>/public/api/resources/bulk</code> (for development versions).</li>
<li>In the crafted request, the attacker manipulates the <code>path</code> parameter (stable) or the <code>path</code> field within the JSON body (development) to include path traversal sequences (e.g., <code>../</code>).</li>
<li>The FileBrowser server receives the request and incorrectly joins the attacker-controlled path with a trusted base path <em>before</em> sanitization.</li>
<li>Due to the path traversal sequences, the resulting path escapes the intended shared directory.</li>
<li>The FileBrowser server attempts to delete the file specified by the manipulated path, which now points to a file outside the intended share.</li>
<li>The targeted file is deleted successfully, resulting in unauthorized data loss.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to delete arbitrary files within the share owner&rsquo;s storage scope. This can lead to significant data loss, service disruption, and potential compromise of sensitive information. The impact is particularly severe if the attacker targets critical system files or data repositories accessible within the FileBrowser instance&rsquo;s storage scope. The vulnerability affects FileBrowser instances with public shares and delete permissions enabled, potentially impacting numerous users who rely on this feature.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of FileBrowser that includes the fix for CVE-2026-44542 to remediate the path traversal vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect FileBrowser Public Share Path Traversal Attempt&rdquo; to your SIEM to identify potential exploitation attempts in real-time by monitoring for suspicious DELETE requests with path traversal sequences.</li>
<li>Review and restrict the use of public shares with delete permissions enabled to minimize the potential attack surface.</li>
<li>Enable webserver logging to provide the necessary data for the provided Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>file-deletion</category><category>web-application</category></item></channel></rss>