FileRise is a self-hosted web file manager / WebDAV server. Versions prior to 2.7.1 are vulnerable to Stored Cross-Site Scripting (XSS) due to unsafe handling of browser-renderable user uploads when served through the sharing and download endpoints. An attacker who can get a crafted SVG (primary) or HTML (secondary) file stored in a FileRise instance can cause JavaScript execution when a victim opens a generated share link (and in some cases via the direct download endpoint). This impacts share links (`/api/file/share.php`) and direct file access / download path (`/api/file/download.php`), depending on browser/content-type behavior. Version 2.7.1 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/error311/FileRise/security/advisories/GHSA-35pp-ggh6-c59c | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-16 17:16
Updated : 2026-01-02 16:48
NVD link : CVE-2025-68116
Mitre link : CVE-2025-68116
CVE.ORG link : CVE-2025-68116
JSON object : View
Products Affected
filerise
- filerise
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
