CVE-2026-25230

4.6 MEDIUM

📋 TL;DR

FileRise versions before 3.3.0 contain an HTML injection vulnerability that allows authenticated users to modify web page content and potentially add malicious form elements or redirects. This affects all self-hosted FileRise installations running vulnerable versions. The vulnerability requires user interaction to trigger malicious actions.

💻 Affected Systems

Products:
  • FileRise
Versions: All versions prior to 3.3.0
Operating Systems: All platforms running FileRise
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to exploit. All FileRise installations with default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker could create phishing forms to steal credentials or redirect users to malicious sites, potentially leading to account compromise or further attacks.

🟠

Likely Case

Malicious user could inject HTML elements that trick other users into submitting forms to attacker-controlled endpoints, potentially capturing session data or performing unauthorized actions.

🟢

If Mitigated

With proper input validation and output encoding, the injected HTML would be rendered harmless as plain text.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and user interaction. The vulnerability is in file handling code where user input isn't properly sanitized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.0

Vendor Advisory: https://github.com/error311/FileRise/security/advisories/GHSA-h8fw-42v6-gfhv

Restart Required: Yes

Instructions:

1. Backup your FileRise installation and data. 2. Download version 3.3.0 from the official GitHub releases. 3. Replace the existing installation with the new version. 4. Restart the FileRise service or web server.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize user-controlled data before processing.

Output Encoding

all

Apply proper HTML encoding to all user-controlled output before rendering in web pages.

🧯 If You Can't Patch

  • Restrict user permissions to minimize attack surface from authenticated users
  • Implement web application firewall rules to detect and block HTML injection attempts

🔍 How to Verify

Check if Vulnerable:

Check FileRise version by examining the application files or checking the web interface footer. If version is below 3.3.0, it's vulnerable.

Check Version:

Check the FileRise web interface footer or examine the application's version file if available.

Verify Fix Applied:

After upgrading, verify the version shows 3.3.0 or higher in the web interface or application files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file operations with HTML/script content
  • Multiple failed attempts to access file endpoints with special characters

Network Indicators:

  • HTTP requests containing suspicious HTML tags or JavaScript in file-related parameters

SIEM Query:

source="filerise" AND (url="*<script*" OR url="*onclick*" OR url="*javascript:*")

🔗 References

📤 Share & Export