CVE-2025-52902

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The Markdown preview function of File Browser prior to v2.33.7 is vulnerable to Stored Cross-Site-Scripting (XSS). Any JavaScript code that is part of a Markdown file uploaded by a user will be executed by the browser. Version 2.33.7 contains a fix for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*

History

10 Jul 2025, 01:09

Type Values Removed Values Added
References () https://github.com/filebrowser/filebrowser/commit/f19943a42e8e092e811dffbe9f4623dac36f1f0d - () https://github.com/filebrowser/filebrowser/commit/f19943a42e8e092e811dffbe9f4623dac36f1f0d - Patch
References () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-4wx8-5gm2-2j97 - () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-4wx8-5gm2-2j97 - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*
First Time Filebrowser filebrowser
Filebrowser

26 Jun 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-26 15:15

Updated : 2025-07-10 01:09


NVD link : CVE-2025-52902

Mitre link : CVE-2025-52902


JSON object : View

Products Affected

filebrowser

  • filebrowser
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-80

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)