CVE-2026-33072: CWE-798: Use of Hard-coded Credentials in error311 FileRise
CVE-2026-33072 is a high-severity vulnerability in FileRise versions prior to 3. 9. 0 caused by the use of a hardcoded default encryption key. This key, 'default_please_change_this_key', is used for all cryptographic operations including HMAC token generation, AES configuration encryption, and session tokens. Because the key is hardcoded and widely known, unauthenticated attackers can forge upload tokens to upload arbitrary files to shared folders and decrypt sensitive admin configuration secrets such as OIDC client secrets and SMTP passwords. The vulnerability arises from the failure to override the default key via environment variables. This issue is fixed in version 3. 9. 0. The CVSS score is 8.
AI Analysis
Technical Summary
FileRise is a self-hosted web file manager and WebDAV server that prior to version 3.9.0 uses a hardcoded default encryption key ('default_please_change_this_key') for all cryptographic operations. This key, known as PERSISTENT_TOKENS_KEY, is embedded in two places in the codebase and is used for generating HMAC tokens, encrypting configuration data with AES, and securing session tokens. If the deployer does not explicitly override this key via environment variables, the default key remains active, allowing attackers to bypass authentication controls. An unauthenticated attacker can exploit this vulnerability to forge upload tokens, enabling arbitrary file uploads to shared folders. Additionally, the attacker can decrypt sensitive administrative secrets such as OIDC client secrets and SMTP passwords, potentially leading to further compromise of the system and connected services. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials) and CWE-1188 (Improper Access of Encrypted Data). The issue was publicly disclosed on March 20, 2026, and fixed in FileRise version 3.9.0. The CVSS v3.1 score is 8.2 (High), with an attack vector of network, no privileges required, no user interaction, and a significant confidentiality impact.
Potential Impact
The impact of this vulnerability is significant for organizations using vulnerable versions of FileRise. Attackers can gain unauthorized access to upload arbitrary files, potentially leading to malware deployment, defacement, or data exfiltration. The ability to decrypt administrative secrets such as OIDC client secrets and SMTP passwords can facilitate further attacks including privilege escalation, lateral movement, and interception or manipulation of email communications. Confidentiality is severely compromised, while integrity is moderately affected due to unauthorized file uploads. Availability impact is low as the vulnerability does not directly enable denial of service. Since exploitation requires no authentication or user interaction and can be performed remotely over the network, the threat is highly accessible to attackers. Organizations relying on FileRise for sensitive file management or integration with identity providers and email systems are at elevated risk, especially if they have not updated to version 3.9.0 or have not overridden the default encryption key.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade FileRise to version 3.9.0 or later, where the hardcoded key issue is resolved. If upgrading is not immediately possible, administrators must ensure that the PERSISTENT_TOKENS_KEY environment variable is explicitly set to a strong, unique cryptographic key, replacing the default hardcoded value. Regularly audit configuration files and environment variables to verify that no default keys remain in use. Implement network-level access controls to restrict exposure of the FileRise service to trusted networks and users only. Monitor logs for suspicious upload token usage or unauthorized file uploads. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block anomalous token generation or upload attempts. Finally, rotate any potentially compromised secrets such as OIDC client credentials and SMTP passwords to prevent further misuse.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2026-33072: CWE-798: Use of Hard-coded Credentials in error311 FileRise
Description
CVE-2026-33072 is a high-severity vulnerability in FileRise versions prior to 3. 9. 0 caused by the use of a hardcoded default encryption key. This key, 'default_please_change_this_key', is used for all cryptographic operations including HMAC token generation, AES configuration encryption, and session tokens. Because the key is hardcoded and widely known, unauthenticated attackers can forge upload tokens to upload arbitrary files to shared folders and decrypt sensitive admin configuration secrets such as OIDC client secrets and SMTP passwords. The vulnerability arises from the failure to override the default key via environment variables. This issue is fixed in version 3. 9. 0. The CVSS score is 8.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
FileRise is a self-hosted web file manager and WebDAV server that prior to version 3.9.0 uses a hardcoded default encryption key ('default_please_change_this_key') for all cryptographic operations. This key, known as PERSISTENT_TOKENS_KEY, is embedded in two places in the codebase and is used for generating HMAC tokens, encrypting configuration data with AES, and securing session tokens. If the deployer does not explicitly override this key via environment variables, the default key remains active, allowing attackers to bypass authentication controls. An unauthenticated attacker can exploit this vulnerability to forge upload tokens, enabling arbitrary file uploads to shared folders. Additionally, the attacker can decrypt sensitive administrative secrets such as OIDC client secrets and SMTP passwords, potentially leading to further compromise of the system and connected services. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials) and CWE-1188 (Improper Access of Encrypted Data). The issue was publicly disclosed on March 20, 2026, and fixed in FileRise version 3.9.0. The CVSS v3.1 score is 8.2 (High), with an attack vector of network, no privileges required, no user interaction, and a significant confidentiality impact.
Potential Impact
The impact of this vulnerability is significant for organizations using vulnerable versions of FileRise. Attackers can gain unauthorized access to upload arbitrary files, potentially leading to malware deployment, defacement, or data exfiltration. The ability to decrypt administrative secrets such as OIDC client secrets and SMTP passwords can facilitate further attacks including privilege escalation, lateral movement, and interception or manipulation of email communications. Confidentiality is severely compromised, while integrity is moderately affected due to unauthorized file uploads. Availability impact is low as the vulnerability does not directly enable denial of service. Since exploitation requires no authentication or user interaction and can be performed remotely over the network, the threat is highly accessible to attackers. Organizations relying on FileRise for sensitive file management or integration with identity providers and email systems are at elevated risk, especially if they have not updated to version 3.9.0 or have not overridden the default encryption key.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade FileRise to version 3.9.0 or later, where the hardcoded key issue is resolved. If upgrading is not immediately possible, administrators must ensure that the PERSISTENT_TOKENS_KEY environment variable is explicitly set to a strong, unique cryptographic key, replacing the default hardcoded value. Regularly audit configuration files and environment variables to verify that no default keys remain in use. Implement network-level access controls to restrict exposure of the FileRise service to trusted networks and users only. Monitor logs for suspicious upload token usage or unauthorized file uploads. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block anomalous token generation or upload attempts. Finally, rotate any potentially compromised secrets such as OIDC client credentials and SMTP passwords to prevent further misuse.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T19:27:06.344Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bd0b4ce32a4fbe5f4933b8
Added to database: 3/20/2026, 8:54:36 AM
Last enriched: 3/27/2026, 7:42:12 PM
Last updated: 5/3/2026, 1:28:31 PM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.