CVE-2026-25231: CWE-284: Improper Access Control in error311 FileRise
CVE-2026-25231 is a high-severity vulnerability in FileRise versions prior to 3. 3. 0, a self-hosted web file manager and WebDAV server. The flaw arises from improper access control on the /uploads directory, allowing unauthenticated users to read files if they know or guess the file path. This can lead to exposure of sensitive data and privacy breaches without requiring any authentication or user interaction. The vulnerability does not impact integrity or availability but poses a significant confidentiality risk. It is fixed in version 3. 3. 0. European organizations using vulnerable versions of FileRise should prioritize upgrading to mitigate potential data leaks.
AI Analysis
Technical Summary
CVE-2026-25231 is an improper access control vulnerability (CWE-284) affecting FileRise, a self-hosted web file manager and WebDAV server, in versions prior to 3.3.0. The vulnerability exists because the application fails to enforce access restrictions on the /uploads directory, allowing any unauthenticated user to directly access files uploaded there if they can guess or know the file path. This lack of access control means sensitive files can be exposed publicly, leading to confidentiality breaches. The vulnerability is categorized under CWE-284 (Improper Access Control) and CWE-552 (Files or Directories Accessible to External Parties). The CVSS v3.1 base score is 7.5, indicating a high severity level, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning the attack can be performed remotely without privileges or user interaction, and it impacts confidentiality only. The vulnerability does not affect data integrity or system availability. Although no known exploits are reported in the wild, the simplicity of exploitation and potential for sensitive data exposure make this a critical issue for organizations relying on FileRise for file management. The issue is resolved in version 3.3.0, where proper access controls are implemented on the /uploads directory to prevent unauthorized file access.
Potential Impact
For European organizations, this vulnerability poses a significant risk of sensitive data exposure, especially for entities that use FileRise to manage confidential or regulated information. Data leaks could lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential financial penalties. Since the vulnerability allows unauthenticated remote access to uploaded files, attackers could harvest sensitive documents, intellectual property, or personally identifiable information without detection. This risk is heightened for sectors such as healthcare, finance, legal, and government agencies that often handle sensitive data and may use self-hosted file management solutions. The lack of integrity or availability impact means the threat is primarily data confidentiality loss, but this alone can have severe consequences under European data protection laws. Organizations with public-facing FileRise instances are particularly vulnerable, as attackers do not need credentials or user interaction to exploit the flaw.
Mitigation Recommendations
European organizations should immediately upgrade FileRise installations to version 3.3.0 or later, where the vulnerability is patched. Until upgrades can be applied, administrators should implement strict network-level access controls to restrict access to the /uploads directory, such as IP whitelisting or VPN-only access. Web server configurations (e.g., Apache, Nginx) can be adjusted to deny direct access to the /uploads path or require authentication before serving files. Regular audits of uploaded files should be conducted to identify and remove any sensitive data that may have been exposed. Organizations should also monitor web server logs for suspicious access patterns indicating attempts to enumerate or access files in the uploads directory. Implementing comprehensive file upload validation and access control policies will help prevent similar issues. Finally, raising user awareness about secure file handling and ensuring that sensitive data is not uploaded without encryption or additional protections can reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2026-25231: CWE-284: Improper Access Control in error311 FileRise
Description
CVE-2026-25231 is a high-severity vulnerability in FileRise versions prior to 3. 3. 0, a self-hosted web file manager and WebDAV server. The flaw arises from improper access control on the /uploads directory, allowing unauthenticated users to read files if they know or guess the file path. This can lead to exposure of sensitive data and privacy breaches without requiring any authentication or user interaction. The vulnerability does not impact integrity or availability but poses a significant confidentiality risk. It is fixed in version 3. 3. 0. European organizations using vulnerable versions of FileRise should prioritize upgrading to mitigate potential data leaks.
AI-Powered Analysis
Technical Analysis
CVE-2026-25231 is an improper access control vulnerability (CWE-284) affecting FileRise, a self-hosted web file manager and WebDAV server, in versions prior to 3.3.0. The vulnerability exists because the application fails to enforce access restrictions on the /uploads directory, allowing any unauthenticated user to directly access files uploaded there if they can guess or know the file path. This lack of access control means sensitive files can be exposed publicly, leading to confidentiality breaches. The vulnerability is categorized under CWE-284 (Improper Access Control) and CWE-552 (Files or Directories Accessible to External Parties). The CVSS v3.1 base score is 7.5, indicating a high severity level, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning the attack can be performed remotely without privileges or user interaction, and it impacts confidentiality only. The vulnerability does not affect data integrity or system availability. Although no known exploits are reported in the wild, the simplicity of exploitation and potential for sensitive data exposure make this a critical issue for organizations relying on FileRise for file management. The issue is resolved in version 3.3.0, where proper access controls are implemented on the /uploads directory to prevent unauthorized file access.
Potential Impact
For European organizations, this vulnerability poses a significant risk of sensitive data exposure, especially for entities that use FileRise to manage confidential or regulated information. Data leaks could lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential financial penalties. Since the vulnerability allows unauthenticated remote access to uploaded files, attackers could harvest sensitive documents, intellectual property, or personally identifiable information without detection. This risk is heightened for sectors such as healthcare, finance, legal, and government agencies that often handle sensitive data and may use self-hosted file management solutions. The lack of integrity or availability impact means the threat is primarily data confidentiality loss, but this alone can have severe consequences under European data protection laws. Organizations with public-facing FileRise instances are particularly vulnerable, as attackers do not need credentials or user interaction to exploit the flaw.
Mitigation Recommendations
European organizations should immediately upgrade FileRise installations to version 3.3.0 or later, where the vulnerability is patched. Until upgrades can be applied, administrators should implement strict network-level access controls to restrict access to the /uploads directory, such as IP whitelisting or VPN-only access. Web server configurations (e.g., Apache, Nginx) can be adjusted to deny direct access to the /uploads path or require authentication before serving files. Regular audits of uploaded files should be conducted to identify and remove any sensitive data that may have been exposed. Organizations should also monitor web server logs for suspicious access patterns indicating attempts to enumerate or access files in the uploads directory. Implementing comprehensive file upload validation and access control policies will help prevent similar issues. Finally, raising user awareness about secure file handling and ensuring that sensitive data is not uploaded without encryption or additional protections can reduce risk.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-30T14:44:47.328Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698a36074b57a58fa16ab1ce
Added to database: 2/9/2026, 7:31:19 PM
Last enriched: 2/17/2026, 9:43:16 AM
Last updated: 2/21/2026, 12:18:07 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.