Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-35607— File Browser: Proxy auth auto-provisioned users inherit Execute permission and Commands

CVSS 8.1 · High EPSS 0.09% · P25
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-35607

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
File Browser: Proxy auth auto-provisioned users inherit Execute permission and Commands
Source: NVD (National Vulnerability Database)
Vulnerability Description
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the fix in commit b6a4fb1 ("self-registered users don't get execute perms") stripped Execute permission and Commands from users created via the signup handler. The same fix was not applied to the proxy auth handler. Users auto-created on first successful proxy-auth login are granted execution capabilities from global defaults, even though the signup path was explicitly changed to prevent execution rights from being inherited by automatically provisioned accounts. This vulnerability is fixed in 2.63.1.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
特权管理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
File Browser 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
File Browser是File Browser开源的一个文件管理界面,在指定的目录,它可以用来上传,删除,预览和编辑文件。 File Browser 2.63.1之前版本存在安全漏洞,该漏洞源于代理身份验证处理程序未应用与注册处理程序相同的修复,导致通过代理身份验证首次登录自动创建的用户被授予执行能力,可能导致权限提升。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
filebrowserfilebrowser < 2.63.1 -

II. Public POCs for CVE-2026-35607

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium
Qwen3.6-35B-A3B · 7445 chars
Paid plan includes:
In-depth vulnerability mechanism
Trigger conditions & impact
Full executable POC code
Exploit chain & mitigation
POC zip download
100+ AI POC generations per month

III. Intelligence Information for CVE-2026-35607

登录查看更多情报信息。

Same Patch Batch · filebrowser · 2026-04-07 · 5 CVEs total

CVE-2026-35585File Browser has a Command Injection via Hook Runner
CVE-2026-35604File Browser share links remain accessible after Share/Download permissions are revoked
CVE-2026-35606File Browser discloses text file content via /api/resources endpoint bypassing Perm.Downlo
CVE-2026-35605File Browser has an access rule bypass via HasPrefix without trailing separator in path ma

IV. Related Vulnerabilities

V. Comments for CVE-2026-35607

No comments yet


Leave a comment