CVE-2026-30933

7.5 HIGH

📋 TL;DR

FileBrowser Quantum versions before 1.3.1-beta and 1.2.2-stable have an incomplete fix for CVE-2026-27611, allowing password-protected shares to leak tokenized download URLs via the /public/api/share/info endpoint. This affects all users running vulnerable versions who have password-protected shares configured.

💻 Affected Systems

Products:
  • FileBrowser Quantum
Versions: All versions before 1.3.1-beta and 1.2.2-stable
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with password-protected shares configured.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could bypass password protection on sensitive files and download them without authentication, potentially exposing confidential data.

🟠

Likely Case

Unauthorized users accessing password-protected shares by obtaining tokenized URLs, leading to data leakage.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to authorized users who already have some access to the system.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires accessing the /public/api/share/info endpoint, which may be publicly accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.1-beta or 1.2.2-stable

Vendor Advisory: https://github.com/gtsteffaniak/filebrowser/security/advisories/GHSA-525j-95gf-766f

Restart Required: Yes

Instructions:

1. Backup your configuration and data. 2. Download the patched version from GitHub releases. 3. Replace the existing installation with the new version. 4. Restart the FileBrowser Quantum service.

🔧 Temporary Workarounds

Disable Password-Protected Shares

all

Temporarily disable all password-protected shares until patching is complete.

Edit configuration to remove password-protected shares

Restrict API Access

linux

Block external access to /public/api/share/info endpoint using firewall rules.

iptables -A INPUT -p tcp --dport [PORT] -m string --string "/public/api/share/info" --algo bm -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FileBrowser Quantum from untrusted networks.
  • Enable detailed logging and monitoring for unauthorized access attempts to the /public/api/share/info endpoint.

🔍 How to Verify

Check if Vulnerable:

Check if running version is earlier than 1.3.1-beta or 1.2.2-stable and if password-protected shares are configured.

Check Version:

filebrowser version

Verify Fix Applied:

After patching, verify version is 1.3.1-beta or 1.2.2-stable and test that password-protected shares no longer leak tokenized URLs via /public/api/share/info.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /public/api/share/info endpoint
  • Multiple failed authentication attempts followed by successful file downloads

Network Indicators:

  • HTTP requests to /public/api/share/info from unexpected IP addresses
  • Unusual download patterns from password-protected shares

SIEM Query:

source="filebrowser.log" AND (uri_path="/public/api/share/info" OR (event="file_download" AND share_type="password_protected"))

🔗 References

📤 Share & Export