<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Filebrowser — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/filebrowser/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 00:04:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/filebrowser/feed.xml" rel="self" type="application/rss+xml"/><item><title>File Browser Share Links Accessible After Permission Revocation</title><link>https://feed.craftedsignal.io/briefs/2026-04-filebrowser-share-bypass/</link><pubDate>Wed, 08 Apr 2026 00:04:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-filebrowser-share-bypass/</guid><description>File Browser share links remain accessible after Share/Download permissions are revoked, allowing continued access to shared files even after an administrator revokes the user's permissions.</description><content:encoded><![CDATA[<p>File Browser versions prior to 2.63.1 contain an authorization bypass vulnerability. Specifically, when an administrator revokes a user&rsquo;s share and download permissions, existing share links created by that user remain fully accessible to unauthenticated users. The vulnerability exists because the public share download handler (<code>http/public.go</code>) does not re-check the share owner&rsquo;s current permissions when serving shared files. This can lead to unauthorized data access and a false sense of security for administrators who believe that revoking permissions immediately terminates access to shared resources. The issue was verified against version 2.62.2 (commit 860c19d).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An administrator creates a user account with Share and Download permissions.</li>
<li>The user logs in and creates a share link for a file (e.g., <code>secret.txt</code>). The system generates a hash (e.g., <code>fB4Qwtsn</code>) associated with the share.</li>
<li>An unauthenticated user accesses the file via the share link (e.g., <code>/api/public/dl/fB4Qwtsn</code>), successfully downloading the content.</li>
<li>The administrator revokes the user&rsquo;s Share and Download permissions via the API, modifying the user&rsquo;s record in the system.</li>
<li>The revoked user attempts to create a new share link and is correctly denied access (403 Forbidden).</li>
<li>An unauthenticated user attempts to access the file using the previously created share link (e.g., <code>/api/public/dl/fB4Qwtsn</code>).</li>
<li>The system retrieves the share link information but fails to validate if the original user still possesses Share and Download permissions.</li>
<li>The system serves the file, bypassing the intended authorization restrictions and granting unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows unauthorized access to files shared through File Browser, even after an administrator has revoked the share creator&rsquo;s permissions. This can result in data breaches, as users who should no longer have access to shared resources can still retrieve them via existing share links. The administrator may believe that revoking permissions immediately stops all sharing, leading to a false sense of security. This is particularly impactful in environments where sensitive data is shared via File Browser and access control is critical.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade File Browser to version 2.63.1 or later to patch CVE-2026-35604.</li>
<li>Monitor web server logs for access to <code>/api/public/dl/*</code> endpoints (logsource: webserver, product: linux/windows) after revoking user permissions; correlate with user permission changes.</li>
<li>Implement the suggested fix by adding permission re-validation in <code>withHashFile</code> as described in the advisory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>filebrowser</category><category>authorization-bypass</category><category>github-advisory</category><category>cve-2026-35604</category></item><item><title>File Browser EPUB Preview Stored XSS Vulnerability (CVE-2026-34529)</title><link>https://feed.craftedsignal.io/briefs/2026-04-filebrowser-xss/</link><pubDate>Wed, 01 Apr 2026 21:17:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-filebrowser-xss/</guid><description>File Browser versions prior to 2.62.2 are vulnerable to stored cross-site scripting (XSS) via the EPUB preview function, allowing attackers to execute arbitrary JavaScript in a user's browser by embedding malicious code in a crafted EPUB file.</description><content:encoded><![CDATA[<p>File Browser is a file management interface used for uploading, deleting, previewing, renaming, and editing files. A stored XSS vulnerability, identified as CVE-2026-34529, exists within the EPUB preview functionality of File Browser versions prior to 2.62.2. An attacker can exploit this vulnerability by crafting a malicious EPUB file containing embedded JavaScript. When a user previews the malicious EPUB file through the File Browser interface, the embedded JavaScript executes within their browser, potentially leading to session hijacking, defacement, or redirection to malicious websites. This vulnerability has been addressed in File Browser version 2.62.2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious EPUB file containing embedded JavaScript designed for XSS exploitation.</li>
<li>Attacker uploads the malicious EPUB file to a File Browser instance. This could be achieved if the attacker has write access to the file system, via compromised credentials or anonymous upload functionality (if enabled).</li>
<li>A legitimate user, with access to the File Browser, navigates to the directory containing the malicious EPUB file.</li>
<li>The user previews the EPUB file using the File Browser&rsquo;s built-in preview function.</li>
<li>The File Browser processes the EPUB file, triggering the vulnerable code in the EPUB preview functionality.</li>
<li>The embedded JavaScript within the EPUB file executes in the user&rsquo;s browser in the context of the File Browser application.</li>
<li>The attacker&rsquo;s JavaScript payload can then perform actions such as stealing cookies, redirecting the user, or defacing the File Browser interface.</li>
<li>The attacker can use the stolen cookies to impersonate the user or further compromise the File Browser instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary JavaScript code within the context of a user&rsquo;s browser. This can lead to session hijacking, where an attacker steals a user&rsquo;s session cookie and impersonates them, potentially gaining unauthorized access to sensitive files and system resources. Further consequences include defacement of the File Browser interface, redirection of users to malicious websites, and potentially further compromise of the server hosting the File Browser application depending on the permissions of the compromised user account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade File Browser instances to version 2.62.2 or later to patch the XSS vulnerability (CVE-2026-34529).</li>
<li>Implement input validation and sanitization on file uploads to prevent the injection of malicious code.</li>
<li>Consider deploying a Content Security Policy (CSP) to restrict the execution of JavaScript from untrusted sources.</li>
<li>Enable logging on the webserver hosting File Browser to capture details of requests for EPUB files, which can be used to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>filebrowser</category><category>cve-2026-34529</category></item><item><title>File Browser Stored XSS via Crafted EPUB File</title><link>https://feed.craftedsignal.io/briefs/2024-07-filebrowser-xss/</link><pubDate>Tue, 31 Mar 2026 23:44:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-filebrowser-xss/</guid><description>File Browser version 2.62.1 and earlier is vulnerable to stored cross-site scripting (XSS) via crafted EPUB files, allowing attackers to execute arbitrary JavaScript in a victim's browser by exploiting the application's misconfigured iframe sandbox and stealing sensitive information like JWT tokens.</description><content:encoded><![CDATA[<p>File Browser, a web-based file management application, is susceptible to stored XSS attacks in versions 2.62.1 and earlier. The vulnerability stems from the application&rsquo;s EPUB preview functionality, which allows scripted content (<code>allowScriptedContent: true</code>) to execute within an iframe.  The iframe&rsquo;s sandbox is misconfigured, including both <code>allow-scripts</code> and <code>allow-same-origin</code>, effectively bypassing the intended security restrictions. An attacker can upload a specially crafted EPUB file containing malicious JavaScript code. When a user previews the file, the embedded JavaScript executes in their browser, enabling session hijacking via JWT token theft, data exfiltration, and potential privilege escalation if the victim is an administrator.  This vulnerability is similar to CVE-2024-35236 found in audiobookshelf, highlighting a recurring pattern of insecure EPUB handling.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious EPUB file containing embedded JavaScript designed to steal JWT tokens and exfiltrate data.</li>
<li>The attacker authenticates to the File Browser application with a valid, potentially low-privilege, user account.</li>
<li>The attacker uploads the malicious EPUB file to the File Browser server via the <code>/api/resources</code> endpoint, potentially overwriting existing files using the <code>override=true</code> parameter.</li>
<li>The server stores the malicious EPUB file.</li>
<li>A victim, potentially an administrator, views the uploaded EPUB file through the File Browser&rsquo;s web interface, triggering the EPUB preview function.</li>
<li>The application renders the EPUB file within an iframe. Due to the <code>allowScriptedContent</code> setting and misconfigured sandbox, the embedded JavaScript executes.</li>
<li>The JavaScript steals the victim&rsquo;s JWT token from <code>window.parent.localStorage</code> and exfiltrates it to an attacker-controlled server (<code>https://attacker.example/?stolen=</code>). It may also attempt to gather additional information, such as the victim&rsquo;s public IP address by requesting <code>https://ifconfig.me/ip</code>.</li>
<li>The attacker uses the stolen JWT token to hijack the victim&rsquo;s session, potentially gaining administrative privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability allows attackers to steal JWT tokens, leading to full session hijacking and potential privilege escalation. A low-privilege user with upload permissions can compromise administrator accounts. This can lead to unauthorized access to sensitive files, data exfiltration, and modification or deletion of critical data. The vulnerability affects File Browser instances version 2.62.1 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches or upgrade File Browser to a version greater than 2.62.1 to mitigate CVE-2026-34529.</li>
<li>Deploy the Sigma rule <code>Detect File Browser EPUB XSS Attempt</code> to identify potential exploitation attempts by monitoring for network connections to <code>ifconfig.me</code> originating from the File Browser application.</li>
<li>Deploy the Sigma rule <code>Detect File Browser JWT Exfiltration</code> to detect potential exfiltration of JWT tokens by monitoring network connections to <code>attacker.example</code> with a <code>stolen</code> parameter.</li>
<li>Disable EPUB preview functionality or sanitize EPUB files before rendering them to prevent the execution of malicious scripts. This addresses the root cause by preventing attacker-controlled JavaScript execution.</li>
<li>Review and harden the iframe sandbox configuration used for EPUB previews to restrict access to sensitive resources and prevent script execution, if preview functionality cannot be disabled.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>filebrowser</category><category>xss</category><category>epub</category><category>cve-2026-34529</category></item></channel></rss>