Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62510: CWE-280: Improper Handling of Insufficient Permissions or Privileges in error311 FileRise

0
High
VulnerabilityCVE-2025-62510cvecve-2025-62510cwe-280cwe-284
Published: Mon Oct 20 2025 (10/20/2025, 17:39:10 UTC)
Source: CVE Database V5
Vendor/Project: error311
Product: FileRise

Description

FileRise is a self-hosted web-based file manager with multi-file upload, editing, and batch operations. In version 1.4.0, a regression allowed folder visibility/ownership to be inferred from folder names. Low-privilege users could see or interact with folders matching their username and, in some cases, other users’ content. This issue has been patched in version 1.5.0, where it introduces explicit per-folder ACLs (owners/read/write/share/read_own) and strict server-side checks across list, read, write, share, rename, copy/move, zip, and WebDAV paths.

AI-Powered Analysis

AILast updated: 10/20/2025, 17:58:08 UTC

Technical Analysis

CVE-2025-62510 is a vulnerability identified in FileRise version 1.4.0, a self-hosted web-based file manager designed for multi-file upload, editing, and batch operations. The flaw is a regression that improperly handles permissions, specifically allowing low-privilege users to infer folder visibility and ownership based on folder names. This weakness arises from insufficient enforcement of access controls, enabling users to see or interact with folders that match their username and, in some cases, access other users' content without proper authorization. The vulnerability is classified under CWE-280 (Improper Handling of Insufficient Permissions or Privileges) and CWE-284 (Improper Access Control). The CVSS 3.1 base score is 8.1 (high), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H), but no impact on availability (A:N). The issue affects only version 1.4.0 and was patched in version 1.5.0 by implementing explicit per-folder ACLs that define owners, read, write, share, and read_own permissions. Additionally, strict server-side checks were introduced for all relevant file operations including listing, reading, writing, sharing, renaming, copying/moving, zipping, and WebDAV access paths. This comprehensive fix ensures that unauthorized users cannot infer or access folders beyond their privileges. No known exploits have been reported in the wild, but the ease of exploitation and high impact make this a critical vulnerability to address promptly.

Potential Impact

For European organizations using FileRise version 1.4.0, this vulnerability poses a significant risk of unauthorized data exposure and manipulation. Confidential information stored in user-specific or shared folders could be accessed or modified by low-privilege users, potentially leading to data breaches, privacy violations, and loss of data integrity. This is particularly concerning for sectors handling sensitive personal data under GDPR, such as healthcare, finance, and government institutions. The ability to infer folder ownership and visibility could also facilitate further targeted attacks or lateral movement within the network. While availability is not impacted, the breach of confidentiality and integrity could result in regulatory penalties, reputational damage, and operational disruptions. Organizations relying on FileRise for internal file management must consider the risk of insider threats exploiting this flaw or external attackers gaining low-level access to exploit the vulnerability remotely.

Mitigation Recommendations

Organizations should immediately upgrade FileRise installations from version 1.4.0 to version 1.5.0 or later, where the vulnerability is fully patched. Beyond patching, administrators should audit existing folder permissions and ACLs to ensure no unauthorized access persists. Implement network segmentation and restrict access to the FileRise management interface to trusted internal networks or VPNs to reduce exposure. Enable detailed logging and monitoring of file access and modification activities to detect suspicious behavior early. Conduct regular permission reviews and enforce the principle of least privilege for all users. If upgrading is temporarily not possible, consider disabling WebDAV access and restricting folder visibility through configuration changes to limit the attack surface. Finally, educate users about the risks of unauthorized access and encourage reporting of anomalous file access patterns.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-15T15:03:28.133Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f674d107c863f5093c9144

Added to database: 10/20/2025, 5:43:45 PM

Last enriched: 10/20/2025, 5:58:08 PM

Last updated: 10/21/2025, 1:39:22 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats