File Browser, Stored XSS, CVE-2025-XXXX (Critical)

Listen to this Post

How the CVE Works

The vulnerability arises due to improper sanitization of HTML/JavaScript within Markdown files in File Browser v2.32.0. When a user uploads a malicious `.md` file containing embedded JavaScript (e.g., <img src="x" onerror=alert(1)>), the preview function renders and executes the script. This occurs because the Markdown parser fails to strip or sanitize HTML events, leading to stored XSS. Attackers can exploit this to hijack sessions, escalate privileges, or perform actions on behalf of the victim.

DailyCVE Form

Platform: File Browser
Version: 2.32.0
Vulnerability: Stored XSS
Severity: Critical
Date: 2025-06-26

Prediction: Patch expected by 2025-06-30

What Undercode Say

Check vulnerable version
filebrowser --version | grep "2.32.0"
PoC Markdown payload
echo '<img src="x" onerror=alert(document.cookie)>' > exploit.md

How Exploit

1. Upload `exploit.md` to File Browser.

2. Victim previews the file.

3. Malicious script executes in victim’s context.

Protection from this CVE

  • Update to v2.33.7+.
  • Enable CSP headers.
  • Sanitize Markdown with DOMPurify.

Impact

  • Session hijacking.
  • Privilege escalation.
  • Remote code execution.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top