File Browser, Insecure File Sharing, CVE-2025-XXXX (Critical)

Listen to this Post

How the CVE Works

The vulnerability occurs when File Browser generates two share links for password-protected filesβ€”one requiring authentication and another unprotected direct download link. The unprotected link contains an access token (token=voDK6j[...]) in the URL, bypassing password checks. Attackers can exploit this by:
1. Intercepting the unprotected link via browser history, proxy logs, or accidental sharing.
2. Using the token to directly access files via `/api/public/dl/6Gtw0xAw?inline=true&token=voDK6j[…]` without a password.
The server fails to validate the password for token-based requests, leaking sensitive files.

DailyCVE Form

Platform: File Browser
Version: 2.32.0
Vulnerability: Insecure direct download
Severity: Critical
Date: 2025-06-29

Prediction: Patch by 2025-07-15

What Undercode Say

Analytics:

curl -X GET "http://filebrowser.local:8080/api/public/dl/6Gtw0xAw?token=voDK6j[...]"
grep "X-SHARE-PASSWORD" /var/log/filebrowser/access.log

Exploit:

1. Extract tokens from proxy logs.

2. Craft direct download requests.

Protection:

  • Disable unprotected links in GUI.
  • Enforce password checks for all `/api/public/dl` requests.

Impact:

  • Unauthorized file access.
  • Data exfiltration.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top