File Browser provides a file managing interface within a specified directory and can be used to upload, delete, preview, rename, and edit files. Prior to version 2.55.0, the JSONAuth. Auth function contains a logic flaw that allows unauthenticated attackers to enumerate valid usernames by measuring the response time of the /api/login endpoint. The vulnerability exists due to a "short-circuit" evaluation in the authentication logic. When a username is not found in the database, the function returns immediately. However, if the username does exist, the code proceeds to verify the password using bcrypt (users.CheckPwd), which is a computationally expensive operation designed to be slow. This difference in execution path creates a measurable timing discrepancy. Version 2.55.0 contains a patch for the issue.
References
| Link | Resource |
|---|---|
| https://github.com/filebrowser/filebrowser/commit/24781badd413ee20333aba5cce1919d676e01889 | Patch |
| https://github.com/filebrowser/filebrowser/security/advisories/GHSA-43mm-m3h2-3prc | Exploit Vendor Advisory |
Configurations
History
03 Feb 2026, 14:30
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-203 | |
| First Time |
Filebrowser
Filebrowser filebrowser |
|
| CPE | cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:* | |
| References | () https://github.com/filebrowser/filebrowser/commit/24781badd413ee20333aba5cce1919d676e01889 - Patch | |
| References | () https://github.com/filebrowser/filebrowser/security/advisories/GHSA-43mm-m3h2-3prc - Exploit, Vendor Advisory |
Information
Published : 2026-01-19 21:15
Updated : 2026-02-03 14:30
NVD link : CVE-2026-23849
Mitre link : CVE-2026-23849
CVE.ORG link : CVE-2026-23849
JSON object : View
Products Affected
filebrowser
- filebrowser
