Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33072: CWE-798: Use of Hard-coded Credentials in error311 FileRise

0
High
VulnerabilityCVE-2026-33072cvecve-2026-33072cwe-798cwe-1188
Published: Fri Mar 20 2026 (03/20/2026, 08:31:08 UTC)
Source: CVE Database V5
Vendor/Project: error311
Product: FileRise

Description

FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.9.0, a hardcoded default encryption key (default_please_change_this_key) is used for all cryptographic operations — HMAC token generation, AES config encryption, and session tokens — allowing any unauthenticated attacker to forge upload tokens for arbitrary file upload to shared folders, and to decrypt admin configuration secrets including OIDC client secrets and SMTP passwords. FileRise uses a single key (PERSISTENT_TOKENS_KEY) for all crypto operations. The default value default_please_change_this_key is hardcoded in two places and used unless the deployer explicitly overrides the environment variable. This issue is fixed in version 3.9.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 09:08:55 UTC

Technical Analysis

FileRise is a self-hosted web file manager and WebDAV server that, in versions before 3.9.0, suffers from a critical cryptographic vulnerability identified as CVE-2026-33072. The core issue is the use of a hardcoded default encryption key, 'default_please_change_this_key', embedded in the codebase in two locations. This key, known as PERSISTENT_TOKENS_KEY, is used uniformly across all cryptographic operations including HMAC token generation, AES encryption of configuration data, and session token creation. Because the default key is static and widely known, any unauthenticated attacker can exploit this to forge upload tokens, granting the ability to upload arbitrary files to shared folders without authorization. Furthermore, the attacker can decrypt sensitive administrative secrets stored by FileRise, such as OpenID Connect (OIDC) client secrets and SMTP passwords, compromising confidentiality of critical credentials. The vulnerability stems from CWE-798 (Use of Hard-coded Credentials) and CWE-1188 (Incorrect Access of Indexable Resource in Cryptographic Operation). No authentication or user interaction is required to exploit this flaw, and the attack surface is broad given the default key is used unless explicitly overridden by environment variables during deployment. The vulnerability was publicly disclosed on March 20, 2026, with a CVSS v3.1 score of 8.2 (high severity), reflecting its ease of exploitation and significant confidentiality impact. The issue is resolved in FileRise version 3.9.0, which removes the hardcoded key and enforces proper key management practices.

Potential Impact

The impact of CVE-2026-33072 is substantial for organizations deploying vulnerable versions of FileRise. Attackers can gain unauthorized write access to shared folders by forging upload tokens, potentially leading to the introduction of malicious files or web shells, which could facilitate further compromise or lateral movement. The ability to decrypt administrative secrets such as OIDC client credentials and SMTP passwords exposes organizations to credential theft, identity spoofing, and interception or manipulation of email communications. This breach of confidentiality can undermine trust in authentication mechanisms and disrupt secure communications. Although the vulnerability does not directly allow denial of service or full system takeover, the integrity of the file management system is compromised, and sensitive data exposure can lead to broader security incidents. Organizations relying on FileRise for secure file sharing and configuration management are at risk of data breaches, unauthorized access, and potential regulatory non-compliance due to exposure of sensitive credentials.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade FileRise to version 3.9.0 or later, where the hardcoded default key has been removed and replaced with secure key management. If upgrading is not immediately feasible, administrators must override the default PERSISTENT_TOKENS_KEY environment variable with a strong, unique cryptographic key before deployment to prevent use of the hardcoded key. It is critical to audit existing deployments for the presence of the default key and rotate any exposed secrets, including OIDC client secrets and SMTP passwords, to prevent misuse. Additionally, organizations should implement network-level access controls to restrict access to the FileRise management interface and shared folders, minimizing exposure to unauthenticated attackers. Monitoring file upload activities and logs for anomalous behavior can help detect exploitation attempts. Finally, integrating FileRise deployments with centralized secret management solutions can enhance key security and prevent hardcoding of sensitive credentials in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T19:27:06.344Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bd0b4ce32a4fbe5f4933b8

Added to database: 3/20/2026, 8:54:36 AM

Last enriched: 3/20/2026, 9:08:55 AM

Last updated: 3/21/2026, 2:03:25 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses