CVE-2026-25230
📋 TL;DR
FileRise versions before 3.3.0 contain an HTML injection vulnerability that allows authenticated users to modify web page content and potentially add malicious form elements or redirects. This affects all self-hosted FileRise installations running vulnerable versions. The vulnerability requires user interaction to trigger malicious actions.
💻 Affected Systems
- FileRise
📦 What is this software?
Filerise by Filerise
⚠️ Risk & Real-World Impact
Worst Case
Authenticated attacker could create phishing forms to steal credentials or redirect users to malicious sites, potentially leading to account compromise or further attacks.
Likely Case
Malicious user could inject HTML elements that trick other users into submitting forms to attacker-controlled endpoints, potentially capturing session data or performing unauthorized actions.
If Mitigated
With proper input validation and output encoding, the injected HTML would be rendered harmless as plain text.
🎯 Exploit Status
Exploitation requires authenticated access and user interaction. The vulnerability is in file handling code where user input isn't properly sanitized.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.3.0
Vendor Advisory: https://github.com/error311/FileRise/security/advisories/GHSA-h8fw-42v6-gfhv
Restart Required: Yes
Instructions:
1. Backup your FileRise installation and data. 2. Download version 3.3.0 from the official GitHub releases. 3. Replace the existing installation with the new version. 4. Restart the FileRise service or web server.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side input validation to sanitize user-controlled data before processing.
Output Encoding
allApply proper HTML encoding to all user-controlled output before rendering in web pages.
🧯 If You Can't Patch
- Restrict user permissions to minimize attack surface from authenticated users
- Implement web application firewall rules to detect and block HTML injection attempts
🔍 How to Verify
Check if Vulnerable:
Check FileRise version by examining the application files or checking the web interface footer. If version is below 3.3.0, it's vulnerable.
Check Version:
Check the FileRise web interface footer or examine the application's version file if available.
Verify Fix Applied:
After upgrading, verify the version shows 3.3.0 or higher in the web interface or application files.
📡 Detection & Monitoring
Log Indicators:
- Unusual file operations with HTML/script content
- Multiple failed attempts to access file endpoints with special characters
Network Indicators:
- HTTP requests containing suspicious HTML tags or JavaScript in file-related parameters
SIEM Query:
source="filerise" AND (url="*<script*" OR url="*onclick*" OR url="*javascript:*")
🔗 References
- https://github.com/error311/FileRise/blob/7fee135a5b8feb25558aba0474bd6bb53943fc88/src/controllers/FileController.php#L4016-L4058
- https://github.com/error311/FileRise/blob/7fee135a5b8feb25558aba0474bd6bb53943fc88/src/models/FileModel.php#L3146
- https://github.com/error311/FileRise/releases/tag/v3.3.0
- https://github.com/error311/FileRise/security/advisories/GHSA-h8fw-42v6-gfhv