Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27611: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in gtsteffaniak filebrowser

0
High
VulnerabilityCVE-2026-27611cvecve-2026-27611cwe-200cwe-288cwe-287
Published: Wed Feb 25 2026 (02/25/2026, 02:24:48 UTC)
Source: CVE Database V5
Vendor/Project: gtsteffaniak
Product: filebrowser

Description

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to versions 1.1.3-stable and 1.2.6-beta, when users share password-protected files, the recipient can completely bypass the password and still download the file. This happens because the API returns a direct download link in the details of the share, which is accessible to anyone with JUST THE SHARE LINK, even without the password. Versions 1.1.3-stable and 1.2.6-beta fix the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 18:55:56 UTC

Technical Analysis

CVE-2026-27611 is a vulnerability in the FileBrowser Quantum software, a self-hosted, web-based file manager developed by gtsteffaniak. The issue exists in versions prior to 1.1.3-stable and between 1.2.0-beta and 1.2.6-beta, where password-protected file shares can be accessed without authentication. The root cause is that the API returns a direct download URL within the share details, which is accessible to anyone possessing the share link, bypassing the password protection mechanism entirely. This constitutes an exposure of sensitive information (CWE-200) and involves authentication bypass weaknesses (CWE-287 and CWE-288). The vulnerability allows an attacker with only the share link—no password or user authentication required—to download files directly, compromising confidentiality. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and high impact on confidentiality (VC:H), with limited impact on integrity and availability. Although no known exploits have been reported in the wild, the flaw poses a significant risk to any organization using affected versions for sensitive file sharing. The issue was addressed in versions 1.1.3-stable and 1.2.6-beta by removing or securing the direct download link in the API response.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive files shared via FileBrowser Quantum. Attackers who obtain the share link can bypass password protection and download files directly, leading to potential data breaches involving confidential or proprietary information. This compromises confidentiality severely, while integrity and availability impacts are minimal. Organizations relying on FileBrowser for secure file sharing risk exposure of intellectual property, personal data, or regulated information, which could result in legal liabilities, reputational damage, and compliance violations. Since the vulnerability requires only possession of the share link and minimal user interaction, exploitation is relatively easy, increasing the threat level. The scope includes any organization using vulnerable versions of FileBrowser Quantum, especially those sharing sensitive data externally or internally. Although no active exploits are known, the vulnerability’s presence in widely used self-hosted file management software makes it a significant risk vector for data leakage.

Mitigation Recommendations

Organizations should immediately upgrade FileBrowser Quantum to version 1.1.3-stable or 1.2.6-beta or later, where the vulnerability is fixed. Until upgrades are applied, administrators should avoid sharing password-protected files via the vulnerable versions or disable sharing features if possible. Review and audit existing shared links to identify and revoke any that may expose sensitive data. Implement network-level access controls to restrict access to the FileBrowser instance, such as VPNs or IP whitelisting, to reduce exposure. Monitor logs for unusual download activity or access patterns that could indicate exploitation attempts. Educate users about the risks of sharing links and encourage use of additional encryption or secure transfer methods. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized API access if immediate patching is not feasible. Regularly review and update security policies around file sharing and access control to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T19:43:14.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e6864b7ef31ef0bae9d12

Added to database: 2/25/2026, 3:11:32 AM

Last enriched: 3/4/2026, 6:55:56 PM

Last updated: 4/11/2026, 11:27:43 PM

Views: 120

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses