CVE-2026-33072: CWE-798: Use of Hard-coded Credentials in error311 FileRise
FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.9.0, a hardcoded default encryption key (default_please_change_this_key) is used for all cryptographic operations — HMAC token generation, AES config encryption, and session tokens — allowing any unauthenticated attacker to forge upload tokens for arbitrary file upload to shared folders, and to decrypt admin configuration secrets including OIDC client secrets and SMTP passwords. FileRise uses a single key (PERSISTENT_TOKENS_KEY) for all crypto operations. The default value default_please_change_this_key is hardcoded in two places and used unless the deployer explicitly overrides the environment variable. This issue is fixed in version 3.9.0.
AI Analysis
Technical Summary
FileRise is a self-hosted web file manager and WebDAV server that, in versions before 3.9.0, suffers from a critical cryptographic vulnerability identified as CVE-2026-33072. The core issue is the use of a hardcoded default encryption key, 'default_please_change_this_key', embedded in the codebase in two locations. This key, known as PERSISTENT_TOKENS_KEY, is used uniformly across all cryptographic operations including HMAC token generation, AES encryption of configuration data, and session token creation. Because the default key is static and widely known, any unauthenticated attacker can exploit this to forge upload tokens, granting the ability to upload arbitrary files to shared folders without authorization. Furthermore, the attacker can decrypt sensitive administrative secrets stored by FileRise, such as OpenID Connect (OIDC) client secrets and SMTP passwords, compromising confidentiality of critical credentials. The vulnerability stems from CWE-798 (Use of Hard-coded Credentials) and CWE-1188 (Incorrect Access of Indexable Resource in Cryptographic Operation). No authentication or user interaction is required to exploit this flaw, and the attack surface is broad given the default key is used unless explicitly overridden by environment variables during deployment. The vulnerability was publicly disclosed on March 20, 2026, with a CVSS v3.1 score of 8.2 (high severity), reflecting its ease of exploitation and significant confidentiality impact. The issue is resolved in FileRise version 3.9.0, which removes the hardcoded key and enforces proper key management practices.
Potential Impact
The impact of CVE-2026-33072 is substantial for organizations deploying vulnerable versions of FileRise. Attackers can gain unauthorized write access to shared folders by forging upload tokens, potentially leading to the introduction of malicious files or web shells, which could facilitate further compromise or lateral movement. The ability to decrypt administrative secrets such as OIDC client credentials and SMTP passwords exposes organizations to credential theft, identity spoofing, and interception or manipulation of email communications. This breach of confidentiality can undermine trust in authentication mechanisms and disrupt secure communications. Although the vulnerability does not directly allow denial of service or full system takeover, the integrity of the file management system is compromised, and sensitive data exposure can lead to broader security incidents. Organizations relying on FileRise for secure file sharing and configuration management are at risk of data breaches, unauthorized access, and potential regulatory non-compliance due to exposure of sensitive credentials.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade FileRise to version 3.9.0 or later, where the hardcoded default key has been removed and replaced with secure key management. If upgrading is not immediately feasible, administrators must override the default PERSISTENT_TOKENS_KEY environment variable with a strong, unique cryptographic key before deployment to prevent use of the hardcoded key. It is critical to audit existing deployments for the presence of the default key and rotate any exposed secrets, including OIDC client secrets and SMTP passwords, to prevent misuse. Additionally, organizations should implement network-level access controls to restrict access to the FileRise management interface and shared folders, minimizing exposure to unauthenticated attackers. Monitoring file upload activities and logs for anomalous behavior can help detect exploitation attempts. Finally, integrating FileRise deployments with centralized secret management solutions can enhance key security and prevent hardcoding of sensitive credentials in the future.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2026-33072: CWE-798: Use of Hard-coded Credentials in error311 FileRise
Description
FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.9.0, a hardcoded default encryption key (default_please_change_this_key) is used for all cryptographic operations — HMAC token generation, AES config encryption, and session tokens — allowing any unauthenticated attacker to forge upload tokens for arbitrary file upload to shared folders, and to decrypt admin configuration secrets including OIDC client secrets and SMTP passwords. FileRise uses a single key (PERSISTENT_TOKENS_KEY) for all crypto operations. The default value default_please_change_this_key is hardcoded in two places and used unless the deployer explicitly overrides the environment variable. This issue is fixed in version 3.9.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
FileRise is a self-hosted web file manager and WebDAV server that, in versions before 3.9.0, suffers from a critical cryptographic vulnerability identified as CVE-2026-33072. The core issue is the use of a hardcoded default encryption key, 'default_please_change_this_key', embedded in the codebase in two locations. This key, known as PERSISTENT_TOKENS_KEY, is used uniformly across all cryptographic operations including HMAC token generation, AES encryption of configuration data, and session token creation. Because the default key is static and widely known, any unauthenticated attacker can exploit this to forge upload tokens, granting the ability to upload arbitrary files to shared folders without authorization. Furthermore, the attacker can decrypt sensitive administrative secrets stored by FileRise, such as OpenID Connect (OIDC) client secrets and SMTP passwords, compromising confidentiality of critical credentials. The vulnerability stems from CWE-798 (Use of Hard-coded Credentials) and CWE-1188 (Incorrect Access of Indexable Resource in Cryptographic Operation). No authentication or user interaction is required to exploit this flaw, and the attack surface is broad given the default key is used unless explicitly overridden by environment variables during deployment. The vulnerability was publicly disclosed on March 20, 2026, with a CVSS v3.1 score of 8.2 (high severity), reflecting its ease of exploitation and significant confidentiality impact. The issue is resolved in FileRise version 3.9.0, which removes the hardcoded key and enforces proper key management practices.
Potential Impact
The impact of CVE-2026-33072 is substantial for organizations deploying vulnerable versions of FileRise. Attackers can gain unauthorized write access to shared folders by forging upload tokens, potentially leading to the introduction of malicious files or web shells, which could facilitate further compromise or lateral movement. The ability to decrypt administrative secrets such as OIDC client credentials and SMTP passwords exposes organizations to credential theft, identity spoofing, and interception or manipulation of email communications. This breach of confidentiality can undermine trust in authentication mechanisms and disrupt secure communications. Although the vulnerability does not directly allow denial of service or full system takeover, the integrity of the file management system is compromised, and sensitive data exposure can lead to broader security incidents. Organizations relying on FileRise for secure file sharing and configuration management are at risk of data breaches, unauthorized access, and potential regulatory non-compliance due to exposure of sensitive credentials.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade FileRise to version 3.9.0 or later, where the hardcoded default key has been removed and replaced with secure key management. If upgrading is not immediately feasible, administrators must override the default PERSISTENT_TOKENS_KEY environment variable with a strong, unique cryptographic key before deployment to prevent use of the hardcoded key. It is critical to audit existing deployments for the presence of the default key and rotate any exposed secrets, including OIDC client secrets and SMTP passwords, to prevent misuse. Additionally, organizations should implement network-level access controls to restrict access to the FileRise management interface and shared folders, minimizing exposure to unauthenticated attackers. Monitoring file upload activities and logs for anomalous behavior can help detect exploitation attempts. Finally, integrating FileRise deployments with centralized secret management solutions can enhance key security and prevent hardcoding of sensitive credentials in the future.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T19:27:06.344Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bd0b4ce32a4fbe5f4933b8
Added to database: 3/20/2026, 8:54:36 AM
Last enriched: 3/20/2026, 9:08:55 AM
Last updated: 3/21/2026, 2:03:25 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.