Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25230: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in error311 FileRise

0
Medium
VulnerabilityCVE-2026-25230cvecve-2026-25230cwe-79cwe-116
Published: Mon Feb 09 2026 (02/09/2026, 18:32:09 UTC)
Source: CVE Database V5
Vendor/Project: error311
Product: FileRise

Description

CVE-2026-25230 is a medium severity cross-site scripting (XSS) vulnerability affecting FileRise versions prior to 3. 3. 0. It allows an authenticated user to inject HTML elements into the web interface, potentially modifying the DOM to include malicious forms or links that could redirect users or trigger unwanted actions upon interaction. Exploitation requires authentication and user interaction, limiting its impact to users with access to the system. The vulnerability does not compromise confidentiality but can affect integrity and availability by manipulating the web interface. This issue has been fixed in FileRise version 3. 3. 0. European organizations using vulnerable versions should prioritize upgrading and implement strict access controls to mitigate risks.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:43:02 UTC

Technical Analysis

CVE-2026-25230 is an HTML Injection vulnerability classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and CWE-116 (Improper Encoding or Escaping of Output). It affects FileRise, a self-hosted web file manager and WebDAV server, in versions prior to 3.3.0. The vulnerability allows an authenticated user to inject arbitrary HTML elements into the Document Object Model (DOM) of the web interface. This can include form elements that interact with backend endpoints or link elements that redirect users upon clicking. Because the vulnerability requires authentication and user interaction, exploitation is limited to users who already have some level of access to the system. The injected content can be used to manipulate the user interface, potentially leading to actions like phishing within the application, session manipulation, or triggering unintended requests. The CVSS v3.1 score is 4.6 (medium severity), reflecting the limited scope and impact. The vulnerability was publicly disclosed on February 9, 2026, and has been addressed in FileRise version 3.3.0. No known exploits are reported in the wild at this time.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity and availability of the FileRise web interface. Since exploitation requires authenticated access, the threat is mostly internal or from compromised accounts. Attackers could manipulate the web interface to trick users into performing unintended actions, potentially leading to data manipulation or denial of service within the application. While confidentiality is not directly impacted, the altered interface could facilitate social engineering attacks or indirect data exposure. Organizations relying on FileRise for file management or WebDAV services could face operational disruptions or reduced trust in the system's integrity. The impact is heightened in environments with multiple users sharing access or where user privileges are not tightly controlled.

Mitigation Recommendations

European organizations should immediately upgrade all FileRise instances to version 3.3.0 or later to remediate this vulnerability. Until upgrades are completed, implement strict access controls to limit authenticated user privileges, ensuring only trusted users have write or administrative access. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious HTML injection attempts. Conduct regular audits of user accounts and session activities to identify unusual behavior. Additionally, educate users about the risks of interacting with unexpected or suspicious interface elements, emphasizing caution with links and forms within the application. Consider network segmentation to isolate FileRise servers from broader enterprise networks, reducing the risk of lateral movement if an account is compromised.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-30T14:44:47.328Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698a36074b57a58fa16ab1c8

Added to database: 2/9/2026, 7:31:19 PM

Last enriched: 2/17/2026, 9:43:02 AM

Last updated: 2/21/2026, 2:19:19 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats