CVE-2025-53826

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser’s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist.
Configurations

Configuration 1 (hide)

cpe:2.3:a:filebrowser:filebrowser:2.39.0:*:*:*:*:*:*:*

History

05 Aug 2025, 18:26

Type Values Removed Values Added
References () https://github.com/filebrowser/filebrowser/issues/5216 - () https://github.com/filebrowser/filebrowser/issues/5216 - Issue Tracking
References () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-7xwp-2cpp-p8r7 - () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-7xwp-2cpp-p8r7 - Exploit, Vendor Advisory
CPE cpe:2.3:a:filebrowser:filebrowser:2.39.0:*:*:*:*:*:*:*
First Time Filebrowser filebrowser
Filebrowser
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

15 Jul 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-15 18:15

Updated : 2025-08-05 18:26


NVD link : CVE-2025-53826

Mitre link : CVE-2025-53826


JSON object : View

Products Affected

filebrowser

  • filebrowser
CWE

No CWE.