CVE-2026-27611: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in gtsteffaniak filebrowser
CVE-2026-27611 is a high-severity vulnerability in the FileBrowser Quantum web-based file manager that allows unauthorized users to bypass password protection on shared files. The flaw exists in versions prior to 1. 1. 3-stable and between 1. 2. 0-beta and 1. 2. 6-beta, where the API exposes a direct download link in the share details accessible to anyone with the share link, regardless of password authentication. This results in exposure of sensitive files to unauthorized actors without requiring any privileges or authentication. The vulnerability is due to improper access control and information exposure (CWE-200), as well as weaknesses in authentication mechanisms (CWE-287, CWE-288).
AI Analysis
Technical Summary
FileBrowser Quantum is a self-hosted, web-based file management system that allows users to share files with password protection. However, in versions prior to 1.1.3-stable and between 1.2.0-beta and 1.2.6-beta, a critical vulnerability (CVE-2026-27611) exists where the API returns a direct download URL within the share details. This URL can be accessed by anyone possessing the share link, bypassing the password protection entirely. The root cause is an exposure of sensitive information (CWE-200) combined with inadequate authentication and authorization controls (CWE-287 and CWE-288). The vulnerability enables unauthorized actors to download files without any authentication or user interaction, posing a serious confidentiality risk. The CVSS 4.0 score of 7.1 reflects the network attack vector, low attack complexity, no privileges or authentication required, but user interaction is needed (accessing the share link). The vulnerability affects all users sharing password-protected files on vulnerable versions, potentially exposing sensitive or confidential data. Fixed versions 1.1.3-stable and 1.2.6-beta address this by removing the direct download link from the share details or enforcing proper access controls. No public exploits have been reported yet, but the vulnerability's nature makes it a prime target for attackers once discovered.
Potential Impact
The primary impact of CVE-2026-27611 is the unauthorized disclosure of sensitive files shared via FileBrowser Quantum. Organizations relying on this software for internal or external file sharing risk exposing confidential data, intellectual property, or personally identifiable information (PII) to unauthorized parties. This can lead to data breaches, regulatory non-compliance, reputational damage, and potential financial losses. Since the vulnerability allows bypassing password protection without authentication, attackers only need to obtain or guess the share link, which may be distributed or leaked inadvertently. The scope includes any organization using affected versions for file sharing, especially those sharing sensitive or regulated data. The vulnerability undermines trust in the file sharing system and may disrupt business operations if sensitive files are leaked. Although no exploits are known in the wild, the ease of exploitation and high confidentiality impact make this a critical concern for organizations worldwide.
Mitigation Recommendations
To mitigate CVE-2026-27611, organizations should immediately upgrade FileBrowser Quantum to version 1.1.3-stable or 1.2.6-beta or later, where the vulnerability is fixed. Until upgrades are applied, administrators should avoid sharing password-protected files using vulnerable versions or disable sharing features if possible. Review and audit existing shared links to identify any that may expose sensitive data and revoke or regenerate them. Implement network-level access controls to restrict access to the FileBrowser instance to trusted users or IP ranges. Monitor logs for unusual access patterns to shared files. Educate users on secure sharing practices and the risks of link sharing. Additionally, consider implementing multi-factor authentication and enhanced access control policies around file sharing services. Regularly check for updates and security advisories from the vendor to stay informed about new vulnerabilities or patches.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Sweden, Japan, South Korea
CVE-2026-27611: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in gtsteffaniak filebrowser
Description
CVE-2026-27611 is a high-severity vulnerability in the FileBrowser Quantum web-based file manager that allows unauthorized users to bypass password protection on shared files. The flaw exists in versions prior to 1. 1. 3-stable and between 1. 2. 0-beta and 1. 2. 6-beta, where the API exposes a direct download link in the share details accessible to anyone with the share link, regardless of password authentication. This results in exposure of sensitive files to unauthorized actors without requiring any privileges or authentication. The vulnerability is due to improper access control and information exposure (CWE-200), as well as weaknesses in authentication mechanisms (CWE-287, CWE-288).
AI-Powered Analysis
Technical Analysis
FileBrowser Quantum is a self-hosted, web-based file management system that allows users to share files with password protection. However, in versions prior to 1.1.3-stable and between 1.2.0-beta and 1.2.6-beta, a critical vulnerability (CVE-2026-27611) exists where the API returns a direct download URL within the share details. This URL can be accessed by anyone possessing the share link, bypassing the password protection entirely. The root cause is an exposure of sensitive information (CWE-200) combined with inadequate authentication and authorization controls (CWE-287 and CWE-288). The vulnerability enables unauthorized actors to download files without any authentication or user interaction, posing a serious confidentiality risk. The CVSS 4.0 score of 7.1 reflects the network attack vector, low attack complexity, no privileges or authentication required, but user interaction is needed (accessing the share link). The vulnerability affects all users sharing password-protected files on vulnerable versions, potentially exposing sensitive or confidential data. Fixed versions 1.1.3-stable and 1.2.6-beta address this by removing the direct download link from the share details or enforcing proper access controls. No public exploits have been reported yet, but the vulnerability's nature makes it a prime target for attackers once discovered.
Potential Impact
The primary impact of CVE-2026-27611 is the unauthorized disclosure of sensitive files shared via FileBrowser Quantum. Organizations relying on this software for internal or external file sharing risk exposing confidential data, intellectual property, or personally identifiable information (PII) to unauthorized parties. This can lead to data breaches, regulatory non-compliance, reputational damage, and potential financial losses. Since the vulnerability allows bypassing password protection without authentication, attackers only need to obtain or guess the share link, which may be distributed or leaked inadvertently. The scope includes any organization using affected versions for file sharing, especially those sharing sensitive or regulated data. The vulnerability undermines trust in the file sharing system and may disrupt business operations if sensitive files are leaked. Although no exploits are known in the wild, the ease of exploitation and high confidentiality impact make this a critical concern for organizations worldwide.
Mitigation Recommendations
To mitigate CVE-2026-27611, organizations should immediately upgrade FileBrowser Quantum to version 1.1.3-stable or 1.2.6-beta or later, where the vulnerability is fixed. Until upgrades are applied, administrators should avoid sharing password-protected files using vulnerable versions or disable sharing features if possible. Review and audit existing shared links to identify any that may expose sensitive data and revoke or regenerate them. Implement network-level access controls to restrict access to the FileBrowser instance to trusted users or IP ranges. Monitor logs for unusual access patterns to shared files. Educate users on secure sharing practices and the risks of link sharing. Additionally, consider implementing multi-factor authentication and enhanced access control policies around file sharing services. Regularly check for updates and security advisories from the vendor to stay informed about new vulnerabilities or patches.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-20T19:43:14.602Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699e6864b7ef31ef0bae9d12
Added to database: 2/25/2026, 3:11:32 AM
Last enriched: 2/25/2026, 3:25:57 AM
Last updated: 2/25/2026, 8:45:21 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3192: Improper Authentication in Chia Blockchain
MediumCVE-2026-3189: Server-Side Request Forgery in feiyuchuixue sz-boot-parent
LowCVE-2026-27727: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in swaldman mchange-commons-java
HighCVE-2026-27706: CWE-918: Server-Side Request Forgery (SSRF) in makeplane plane
HighCVE-2026-27705: CWE-639: Authorization Bypass Through User-Controlled Key in makeplane plane
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.