Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33071: CWE-434: Unrestricted Upload of File with Dangerous Type in error311 FileRise

0
Medium
VulnerabilityCVE-2026-33071cvecve-2026-33071cwe-434cwe-552
Published: Fri Mar 20 2026 (03/20/2026, 08:27:37 UTC)
Source: CVE Database V5
Vendor/Project: error311
Product: FileRise

Description

CVE-2026-33071 is a medium severity vulnerability in FileRise versions prior to 3. 8. 0, a self-hosted web file manager and WebDAV server. The vulnerability arises because the WebDAV upload endpoint does not validate file extensions, allowing attackers to upload dangerous server-side executable files such as . php, . phtml, and . htaccess. This bypasses the stricter filename validation applied to the regular upload path. In deployments without Apache's LocationMatch protection, this can lead to remote code execution. The flaw exists because the createFile() and put() methods accept filenames directly from WebDAV clients without validation.

AI-Powered Analysis

AILast updated: 03/20/2026, 09:09:26 UTC

Technical Analysis

FileRise is a self-hosted web file manager and WebDAV server used to manage files remotely. Versions prior to 3.8.0 contain a vulnerability (CVE-2026-33071) classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-552 (Files or Directories Accessible to External Parties). The core issue is that the WebDAV upload endpoint accepts any file extension without validation, including potentially dangerous server-side executable extensions such as .php, .phtml, .php5, and .htaccess. This contrasts with the regular upload endpoint, which enforces filename validation using a regex pattern (REGEX_FILE_NAME). The vulnerability stems from the createFile() method in FileRiseDirectory.php and the put() method in FileRiseFile.php, which accept filenames directly from WebDAV clients without validation. In environments where Apache's LocationMatch directive is not configured to restrict execution of uploaded files, attackers can upload malicious scripts and execute them remotely, leading to remote code execution (RCE). This can allow attackers to execute arbitrary code on the server, potentially compromising the system. The vulnerability requires network access to the WebDAV endpoint and authenticated privileges (PR:L), but no user interaction is needed. The CVSS v3.1 base score is 4.3 (medium severity), reflecting limited impact on confidentiality and availability but a potential integrity impact via code execution. The issue was fixed in FileRise version 3.8.0 by adding proper filename validation on the WebDAV upload path. No known exploits have been reported in the wild as of the publication date.

Potential Impact

If exploited, this vulnerability allows an attacker with authenticated access to the WebDAV upload endpoint to upload malicious server-side executable files. In deployments lacking proper Apache LocationMatch protections, this can lead to remote code execution, enabling attackers to run arbitrary code on the server. This compromises the integrity of the system and can lead to further attacks such as data theft, system manipulation, or pivoting within the network. The impact is significant for organizations relying on FileRise for file management and WebDAV services, especially if deployed in internet-facing environments without hardened web server configurations. However, the requirement for authenticated access limits the attack surface somewhat. Organizations with lax access controls or weak credentials are at higher risk. The vulnerability does not directly affect confidentiality or availability but can indirectly lead to data breaches or service disruptions if exploited.

Mitigation Recommendations

1. Upgrade FileRise to version 3.8.0 or later, where the vulnerability is fixed with proper filename validation on the WebDAV upload endpoint. 2. If upgrading immediately is not possible, restrict access to the WebDAV endpoint to trusted users and networks only, using network segmentation and firewall rules. 3. Configure Apache web server with LocationMatch directives or equivalent to prevent execution of uploaded files in the upload directories, effectively blocking execution of malicious scripts. 4. Enforce strong authentication and authorization controls on the WebDAV service to limit who can upload files. 5. Monitor upload directories for suspicious files with executable extensions and remove them promptly. 6. Implement file integrity monitoring and logging to detect unauthorized file uploads or modifications. 7. Conduct regular security audits and penetration testing focusing on WebDAV and file upload functionalities. 8. Educate administrators on secure configuration practices for FileRise and underlying web servers.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T19:27:06.344Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bd0b4ce32a4fbe5f4933b4

Added to database: 3/20/2026, 8:54:36 AM

Last enriched: 3/20/2026, 9:09:26 AM

Last updated: 3/20/2026, 11:35:59 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses