Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33072: CWE-798: Use of Hard-coded Credentials in error311 FileRise

0
High
VulnerabilityCVE-2026-33072cvecve-2026-33072cwe-798cwe-1188
Published: Fri Mar 20 2026 (03/20/2026, 08:31:08 UTC)
Source: CVE Database V5
Vendor/Project: error311
Product: FileRise

Description

CVE-2026-33072 is a high-severity vulnerability in FileRise versions prior to 3. 9. 0 caused by the use of a hardcoded default encryption key. This key, 'default_please_change_this_key', is used for all cryptographic operations including HMAC token generation, AES configuration encryption, and session tokens. Because the key is hardcoded and widely known, unauthenticated attackers can forge upload tokens to upload arbitrary files to shared folders and decrypt sensitive admin configuration secrets such as OIDC client secrets and SMTP passwords. The vulnerability arises from the failure to override the default key via environment variables. This issue is fixed in version 3. 9. 0. The CVSS score is 8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:42:12 UTC

Technical Analysis

FileRise is a self-hosted web file manager and WebDAV server that prior to version 3.9.0 uses a hardcoded default encryption key ('default_please_change_this_key') for all cryptographic operations. This key, known as PERSISTENT_TOKENS_KEY, is embedded in two places in the codebase and is used for generating HMAC tokens, encrypting configuration data with AES, and securing session tokens. If the deployer does not explicitly override this key via environment variables, the default key remains active, allowing attackers to bypass authentication controls. An unauthenticated attacker can exploit this vulnerability to forge upload tokens, enabling arbitrary file uploads to shared folders. Additionally, the attacker can decrypt sensitive administrative secrets such as OIDC client secrets and SMTP passwords, potentially leading to further compromise of the system and connected services. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials) and CWE-1188 (Improper Access of Encrypted Data). The issue was publicly disclosed on March 20, 2026, and fixed in FileRise version 3.9.0. The CVSS v3.1 score is 8.2 (High), with an attack vector of network, no privileges required, no user interaction, and a significant confidentiality impact.

Potential Impact

The impact of this vulnerability is significant for organizations using vulnerable versions of FileRise. Attackers can gain unauthorized access to upload arbitrary files, potentially leading to malware deployment, defacement, or data exfiltration. The ability to decrypt administrative secrets such as OIDC client secrets and SMTP passwords can facilitate further attacks including privilege escalation, lateral movement, and interception or manipulation of email communications. Confidentiality is severely compromised, while integrity is moderately affected due to unauthorized file uploads. Availability impact is low as the vulnerability does not directly enable denial of service. Since exploitation requires no authentication or user interaction and can be performed remotely over the network, the threat is highly accessible to attackers. Organizations relying on FileRise for sensitive file management or integration with identity providers and email systems are at elevated risk, especially if they have not updated to version 3.9.0 or have not overridden the default encryption key.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade FileRise to version 3.9.0 or later, where the hardcoded key issue is resolved. If upgrading is not immediately possible, administrators must ensure that the PERSISTENT_TOKENS_KEY environment variable is explicitly set to a strong, unique cryptographic key, replacing the default hardcoded value. Regularly audit configuration files and environment variables to verify that no default keys remain in use. Implement network-level access controls to restrict exposure of the FileRise service to trusted networks and users only. Monitor logs for suspicious upload token usage or unauthorized file uploads. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block anomalous token generation or upload attempts. Finally, rotate any potentially compromised secrets such as OIDC client credentials and SMTP passwords to prevent further misuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T19:27:06.344Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bd0b4ce32a4fbe5f4933b8

Added to database: 3/20/2026, 8:54:36 AM

Last enriched: 3/27/2026, 7:42:12 PM

Last updated: 5/3/2026, 1:28:31 PM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses