File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser’s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist.
Metrics
Affected Vendors & Products
References
History
Tue, 05 Aug 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:filebrowser:filebrowser:2.39.0:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Tue, 15 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 15 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser’s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist. | |
| Title | FileBrowser Has Insecure JWT Handling Which Allows Session Replay Attacks after Logout | |
| Weaknesses | CWE-305 CWE-385 CWE-613 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-15T18:12:24.289Z
Updated: 2025-07-15T18:37:40.098Z
Reserved: 2025-07-09T14:14:52.530Z
Link: CVE-2025-53826
Updated: 2025-07-15T18:37:28.657Z
Status : Analyzed
Published: 2025-07-15T18:15:24.127
Modified: 2025-08-05T18:26:27.243
Link: CVE-2025-53826
No data.