CVE-2025-62509
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-20

Last updated on: 2025-12-04

Assigner: GitHub, Inc.

Description
FileRise is a self-hosted web-based file manager with multi-file upload, editing, and batch operations. Prior to version 1.4.0, a business logic flaw in FileRise’s file/folder handling allows low-privilege users to perform unauthorized operations (view/delete/modify) on files created by other users. The root cause was inferring ownership/visibility from folder names (e.g., a folder named after a username) and missing server-side authorization/ownership checks across file operation endpoints. This amounted to an IDOR pattern: an attacker could operate on resources identified only by predictable names. This issue has been patched in version 1.4.0 and further hardened in version 1.5.0. A workaround for this issue involves restricting non-admin users to read-only or disable delete/rename APIs server-side, avoid creating top-level folders named after other usernames, and adding server-side checks that verify ownership before delete/rename/move.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-20
Last Modified
2025-12-04
Generated
2026-05-06
AI Q&A
2025-10-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
filerise filerise to 1.4.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-280 The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in FileRise (versions ≤ 1.3.15) is a business logic flaw where low-privilege users can perform unauthorized operations such as viewing, deleting, or modifying files owned by other users. The root cause is that the system inferred file ownership and visibility based on folder names (e.g., folders named after usernames) without proper server-side authorization checks. This allowed attackers to exploit predictable folder names to access or manipulate files they shouldn't have access to, constituting an Insecure Direct Object Reference (IDOR) vulnerability. [3]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access and modification of files belonging to other users, compromising the confidentiality and integrity of data. Low-privilege users could view, delete, or modify files they do not own, potentially leading to data breaches, loss of important files, and unauthorized data manipulation within the FileRise system. [3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability can negatively impact compliance with standards such as GDPR and HIPAA because it allows unauthorized access and modification of sensitive user data, violating principles of data confidentiality and integrity required by these regulations. Unauthorized data exposure or alteration could lead to regulatory non-compliance, legal penalties, and loss of trust. [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting non-admin users to read-only access or disabling delete and rename APIs server-side, avoiding the creation of top-level folders named after other usernames, and adding server-side checks that verify ownership before allowing delete, rename, or move operations. Upgrading to FileRise version 1.4.0 or later is recommended, with version 1.5.0 providing further hardened access control via explicit per-folder ACLs. [3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart