Description

File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the signupHandler in File Browser applies default user permissions via d.settings.Defaults.Apply(user), then strips only Admin. The Execute permission and Commands list from the default user template are not stripped. When an administrator has enabled signup, server-side execution, and set Execute=true in the default user template, any unauthenticated user who self-registers inherits shell execution capabilities and can run arbitrary commands on the server. This issue has been patched in version 2.62.2.

INFO

Published Date :

2026-04-01T20:39:32.013Z

Last Modified :

2026-04-02T14:02:45.546Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-34528 vulnerability.

Vendors Products
Filebrowser
  • Filebrowser
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-34528.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact