CVE-2025-52995

8.0 HIGH

📋 TL;DR

CVE-2025-52995 is an improper command allowlist vulnerability in File Browser that allows authenticated users to execute unauthorized shell commands. This could lead to arbitrary command execution, file system access, and database compromise. All File Browser instances prior to version 2.33.10 are affected.

💻 Affected Systems

Products:
  • File Browser
Versions: All versions prior to 2.33.10
Operating Systems: All platforms running File Browser
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the allowlist implementation for shell commands, affecting all configurations using command execution features.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing attacker to execute arbitrary commands, access all files including sensitive data, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to files managed by File Browser, including database files, configuration files, and user uploads.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are implemented, restricting the attacker to the application's scope.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly accessible to attackers who can exploit this after authentication.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable to insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated access but exploitation is straightforward once authenticated.

Exploitation requires authenticated access to File Browser. The vulnerability is in the allowlist logic, allowing bypass of intended restrictions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.33.10

Vendor Advisory: https://github.com/filebrowser/filebrowser/security/advisories/GHSA-w7qc-6grj-w7r8

Restart Required: Yes

Instructions:

1. Stop File Browser service. 2. Backup configuration and data. 3. Update to version 2.33.10 using your package manager or manual download. 4. Restart File Browser service. 5. Verify functionality.

🔧 Temporary Workarounds

Disable command execution features

all

Remove or disable all shell command execution capabilities in File Browser configuration.

Edit configuration file to remove command execution settings or set allowlist to empty

Network isolation

linux

Restrict network access to File Browser instances using firewall rules.

iptables -A INPUT -p tcp --dport [filebrowser-port] -s [trusted-networks] -j ACCEPT
iptables -A INPUT -p tcp --dport [filebrowser-port] -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access File Browser
  • Apply principle of least privilege to File Browser service account and container permissions

🔍 How to Verify

Check if Vulnerable:

Check File Browser version. If version is below 2.33.10, the system is vulnerable.

Check Version:

filebrowser version

Verify Fix Applied:

Verify File Browser version is 2.33.10 or higher and test command execution features to ensure proper allowlist enforcement.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Access to files outside normal scope
  • Database file access from unexpected users

Network Indicators:

  • Unusual outbound connections from File Browser server
  • Traffic patterns indicating file exfiltration

SIEM Query:

source="filebrowser.log" AND (command_execution OR shell_command) AND NOT allowed_command

🔗 References

📤 Share & Export