Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27611: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in gtsteffaniak filebrowser

0
High
VulnerabilityCVE-2026-27611cvecve-2026-27611cwe-200cwe-288cwe-287
Published: Wed Feb 25 2026 (02/25/2026, 02:24:48 UTC)
Source: CVE Database V5
Vendor/Project: gtsteffaniak
Product: filebrowser

Description

CVE-2026-27611 is a high-severity vulnerability in the FileBrowser Quantum web-based file manager that allows unauthorized users to bypass password protection on shared files. The flaw exists in versions prior to 1. 1. 3-stable and between 1. 2. 0-beta and 1. 2. 6-beta, where the API exposes a direct download link in the share details accessible to anyone with the share link, regardless of password authentication. This results in exposure of sensitive files to unauthorized actors without requiring any privileges or authentication. The vulnerability is due to improper access control and information exposure (CWE-200), as well as weaknesses in authentication mechanisms (CWE-287, CWE-288).

AI-Powered Analysis

AILast updated: 02/25/2026, 03:25:57 UTC

Technical Analysis

FileBrowser Quantum is a self-hosted, web-based file management system that allows users to share files with password protection. However, in versions prior to 1.1.3-stable and between 1.2.0-beta and 1.2.6-beta, a critical vulnerability (CVE-2026-27611) exists where the API returns a direct download URL within the share details. This URL can be accessed by anyone possessing the share link, bypassing the password protection entirely. The root cause is an exposure of sensitive information (CWE-200) combined with inadequate authentication and authorization controls (CWE-287 and CWE-288). The vulnerability enables unauthorized actors to download files without any authentication or user interaction, posing a serious confidentiality risk. The CVSS 4.0 score of 7.1 reflects the network attack vector, low attack complexity, no privileges or authentication required, but user interaction is needed (accessing the share link). The vulnerability affects all users sharing password-protected files on vulnerable versions, potentially exposing sensitive or confidential data. Fixed versions 1.1.3-stable and 1.2.6-beta address this by removing the direct download link from the share details or enforcing proper access controls. No public exploits have been reported yet, but the vulnerability's nature makes it a prime target for attackers once discovered.

Potential Impact

The primary impact of CVE-2026-27611 is the unauthorized disclosure of sensitive files shared via FileBrowser Quantum. Organizations relying on this software for internal or external file sharing risk exposing confidential data, intellectual property, or personally identifiable information (PII) to unauthorized parties. This can lead to data breaches, regulatory non-compliance, reputational damage, and potential financial losses. Since the vulnerability allows bypassing password protection without authentication, attackers only need to obtain or guess the share link, which may be distributed or leaked inadvertently. The scope includes any organization using affected versions for file sharing, especially those sharing sensitive or regulated data. The vulnerability undermines trust in the file sharing system and may disrupt business operations if sensitive files are leaked. Although no exploits are known in the wild, the ease of exploitation and high confidentiality impact make this a critical concern for organizations worldwide.

Mitigation Recommendations

To mitigate CVE-2026-27611, organizations should immediately upgrade FileBrowser Quantum to version 1.1.3-stable or 1.2.6-beta or later, where the vulnerability is fixed. Until upgrades are applied, administrators should avoid sharing password-protected files using vulnerable versions or disable sharing features if possible. Review and audit existing shared links to identify any that may expose sensitive data and revoke or regenerate them. Implement network-level access controls to restrict access to the FileBrowser instance to trusted users or IP ranges. Monitor logs for unusual access patterns to shared files. Educate users on secure sharing practices and the risks of link sharing. Additionally, consider implementing multi-factor authentication and enhanced access control policies around file sharing services. Regularly check for updates and security advisories from the vendor to stay informed about new vulnerabilities or patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T19:43:14.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e6864b7ef31ef0bae9d12

Added to database: 2/25/2026, 3:11:32 AM

Last enriched: 2/25/2026, 3:25:57 AM

Last updated: 2/25/2026, 8:45:21 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats