CVE-2026-35604
Received Received - Intake
Improper Access Control in File Browser Allows Unauthorized Downloads

Publication date: 2026-04-07

Last updated on: 2026-04-16

Assigner: GitHub, Inc.

Description
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, when an admin revokes a user's Share and Download permissions, existing share links created by that user remain fully accessible to unauthenticated users. The public share download handler does not re-check the share owner's current permissions. This vulnerability is fixed in 2.63.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-16
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
filebrowser filebrowser to 2.63.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to files shared via public links. Even after an administrator revokes a user's Share and Download permissions, the existing share links created by that user remain accessible to anyone without authentication.

  • Unauthorized users can access sensitive or confidential files through old share links.
  • Administrators may mistakenly believe that revoking permissions disables all sharing capabilities, leading to a false sense of security.
  • This can result in data leakage and potential exposure of private information.

Can you explain this vulnerability to me?

CVE-2026-35604 is an authorization vulnerability in the File Browser application versions prior to 2.63.1. When an administrator revokes a user's Share and Download permissions, any existing public share links created by that user remain accessible to unauthenticated users. This happens because the public share download handler does not re-check the share owner's current permissions before allowing access.

Technically, while permission checks are enforced when creating new shares, the handler that processes public share links fails to verify if the share owner still has the required Share and Download permissions. As a result, revoked users' previously created share links remain publicly accessible.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by verifying whether existing public share links remain accessible after revoking a user's Share and Download permissions. Specifically, if a share link created by a user is still accessible publicly without authentication even after the user's permissions have been revoked, the system is vulnerable.

To detect this on your system, you can perform the following steps:

  • 1. Identify share links created by users who have had their Share and Download permissions revoked.
  • 2. Attempt to access these share links from an unauthenticated session or different browser/incognito mode.
  • 3. If the links are accessible without authentication, the vulnerability exists.

While no specific commands are provided in the resources, you can use standard HTTP request tools like curl to test access to share URLs. For example:

  • curl -I https://your-filebrowser-domain/path/to/share

If the response status is 200 OK without requiring authentication, it indicates the vulnerability.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the File Browser software to version 2.63.1 or later, where this vulnerability has been fixed.

The fix ensures that the public share download handler re-validates the share owner's current Share and Download permissions before allowing access to existing share links.

Until the upgrade is applied, administrators should be aware that revoking Share and Download permissions does not invalidate existing share links, so sensitive files may remain accessible.

As a temporary workaround, consider manually invalidating or deleting existing share links created by users whose permissions have been revoked.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows previously created public share links to remain accessible to unauthenticated users even after an administrator revokes the share owner's Share and Download permissions.

Such unauthorized access to shared files can lead to exposure of sensitive or personal data, which may violate data protection requirements under regulations like GDPR and HIPAA that mandate strict access controls and revocation of permissions.

Because the system does not properly enforce permission revocation on existing shares, organizations using affected versions of File Browser may face compliance risks related to unauthorized data disclosure.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart