<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Epub — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/epub/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 31 Mar 2026 23:44:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/epub/feed.xml" rel="self" type="application/rss+xml"/><item><title>File Browser Stored XSS via Crafted EPUB File</title><link>https://feed.craftedsignal.io/briefs/2024-07-filebrowser-xss/</link><pubDate>Tue, 31 Mar 2026 23:44:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-filebrowser-xss/</guid><description>File Browser version 2.62.1 and earlier is vulnerable to stored cross-site scripting (XSS) via crafted EPUB files, allowing attackers to execute arbitrary JavaScript in a victim's browser by exploiting the application's misconfigured iframe sandbox and stealing sensitive information like JWT tokens.</description><content:encoded><![CDATA[<p>File Browser, a web-based file management application, is susceptible to stored XSS attacks in versions 2.62.1 and earlier. The vulnerability stems from the application&rsquo;s EPUB preview functionality, which allows scripted content (<code>allowScriptedContent: true</code>) to execute within an iframe.  The iframe&rsquo;s sandbox is misconfigured, including both <code>allow-scripts</code> and <code>allow-same-origin</code>, effectively bypassing the intended security restrictions. An attacker can upload a specially crafted EPUB file containing malicious JavaScript code. When a user previews the file, the embedded JavaScript executes in their browser, enabling session hijacking via JWT token theft, data exfiltration, and potential privilege escalation if the victim is an administrator.  This vulnerability is similar to CVE-2024-35236 found in audiobookshelf, highlighting a recurring pattern of insecure EPUB handling.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious EPUB file containing embedded JavaScript designed to steal JWT tokens and exfiltrate data.</li>
<li>The attacker authenticates to the File Browser application with a valid, potentially low-privilege, user account.</li>
<li>The attacker uploads the malicious EPUB file to the File Browser server via the <code>/api/resources</code> endpoint, potentially overwriting existing files using the <code>override=true</code> parameter.</li>
<li>The server stores the malicious EPUB file.</li>
<li>A victim, potentially an administrator, views the uploaded EPUB file through the File Browser&rsquo;s web interface, triggering the EPUB preview function.</li>
<li>The application renders the EPUB file within an iframe. Due to the <code>allowScriptedContent</code> setting and misconfigured sandbox, the embedded JavaScript executes.</li>
<li>The JavaScript steals the victim&rsquo;s JWT token from <code>window.parent.localStorage</code> and exfiltrates it to an attacker-controlled server (<code>https://attacker.example/?stolen=</code>). It may also attempt to gather additional information, such as the victim&rsquo;s public IP address by requesting <code>https://ifconfig.me/ip</code>.</li>
<li>The attacker uses the stolen JWT token to hijack the victim&rsquo;s session, potentially gaining administrative privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability allows attackers to steal JWT tokens, leading to full session hijacking and potential privilege escalation. A low-privilege user with upload permissions can compromise administrator accounts. This can lead to unauthorized access to sensitive files, data exfiltration, and modification or deletion of critical data. The vulnerability affects File Browser instances version 2.62.1 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches or upgrade File Browser to a version greater than 2.62.1 to mitigate CVE-2026-34529.</li>
<li>Deploy the Sigma rule <code>Detect File Browser EPUB XSS Attempt</code> to identify potential exploitation attempts by monitoring for network connections to <code>ifconfig.me</code> originating from the File Browser application.</li>
<li>Deploy the Sigma rule <code>Detect File Browser JWT Exfiltration</code> to detect potential exfiltration of JWT tokens by monitoring network connections to <code>attacker.example</code> with a <code>stolen</code> parameter.</li>
<li>Disable EPUB preview functionality or sanitize EPUB files before rendering them to prevent the execution of malicious scripts. This addresses the root cause by preventing attacker-controlled JavaScript execution.</li>
<li>Review and harden the iframe sandbox configuration used for EPUB previews to restrict access to sensitive resources and prevent script execution, if preview functionality cannot be disabled.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>filebrowser</category><category>xss</category><category>epub</category><category>cve-2026-34529</category></item></channel></rss>