CVE-2025-62510
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-20

Last updated on: 2025-12-04

Assigner: GitHub, Inc.

Description
FileRise is a self-hosted web-based file manager with multi-file upload, editing, and batch operations. In version 1.4.0, a regression allowed folder visibility/ownership to be inferred from folder names. Low-privilege users could see or interact with folders matching their username and, in some cases, other users’ content. This issue has been patched in version 1.5.0, where it introduces explicit per-folder ACLs (owners/read/write/share/read_own) and strict server-side checks across list, read, write, share, rename, copy/move, zip, and WebDAV paths.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-20
Last Modified
2025-12-04
Generated
2026-05-07
AI Q&A
2025-10-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
filerise filerise to 1.5.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-280 The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-62510 is a vulnerability in FileRise version 1.4.0 where a regression caused folder visibility and ownership to be inferred from folder names. This allowed low-privilege users to see or interact with folders named after their username and, in some cases, access other users' content. The issue was due to improper access control and insufficient permission checks. It was fixed in version 1.5.0 by introducing explicit per-folder ACLs and strict server-side permission checks. [2]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to confidential files and data by low-privilege users, compromising the confidentiality and integrity of the information stored in FileRise. Attackers could view or manipulate folders they should not have access to, potentially exposing sensitive user content. The vulnerability does not affect availability. [2]


What immediate steps should I take to mitigate this vulnerability?

Users should immediately upgrade FileRise to version 1.5.0, which includes a fix introducing explicit per-folder ACLs and strict server-side permission checks to prevent unauthorized folder visibility and access. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart