Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33329: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in error311 FileRise

0
High
VulnerabilityCVE-2026-33329cvecve-2026-33329cwe-22cwe-73
Published: Tue Mar 24 2026 (03/24/2026, 19:14:42 UTC)
Source: CVE Database V5
Vendor/Project: error311
Product: FileRise

Description

CVE-2026-33329 is a high-severity path traversal vulnerability in FileRise, a self-hosted web file manager and WebDAV server. Versions from 1. 0. 1 up to but not including 3. 10. 0 improperly handle the resumableIdentifier parameter in the chunked upload handler, allowing authenticated users with upload permissions to write files to arbitrary directories. This flaw also enables deletion of arbitrary directories during post-assembly cleanup and probing of file or directory existence. Exploitation requires authentication but no user interaction beyond upload permission. The vulnerability impacts integrity and availability of the server filesystem. It has been patched in version 3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 19:47:02 UTC

Technical Analysis

CVE-2026-33329 is a path traversal vulnerability categorized under CWE-22 and CWE-73 affecting FileRise versions 1.0.1 through 3.9.x. The issue arises because the resumableIdentifier parameter, used in the Resumable.js chunked upload handler (UploadModel::handleUpload()), is concatenated directly into filesystem paths without any sanitization or validation. This allows an authenticated user with upload permissions to manipulate the pathname to escape the intended upload directory and write files anywhere on the server's filesystem. Additionally, the vulnerability permits deletion of arbitrary directories during the post-assembly cleanup phase, which can be triggered after file uploads complete. Attackers can also probe for the existence of files or directories, potentially aiding further attacks or reconnaissance. The vulnerability does not require user interaction beyond having upload rights, but it does require authentication, limiting exposure to authorized users. The CVSS v3.1 score is 8.1 (high), reflecting network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts. The vulnerability was publicly disclosed on March 24, 2026, and fixed in FileRise version 3.10.0. No known exploits have been reported in the wild to date.

Potential Impact

This vulnerability poses a significant risk to organizations using vulnerable versions of FileRise. An attacker with upload permissions can overwrite or create arbitrary files anywhere on the server, potentially leading to code execution, defacement, or persistence mechanisms. The ability to delete arbitrary directories can cause data loss and service disruption, impacting availability. Probing file existence can facilitate further attacks by revealing sensitive information about the server's filesystem structure. Since FileRise is often used to manage and share files in enterprise or hosting environments, exploitation could compromise critical data integrity and availability. The requirement for authentication limits the attack surface but insider threats or compromised credentials could enable exploitation. Organizations relying on FileRise for file management or WebDAV services face risks of unauthorized data manipulation, service outages, and potential lateral movement within their networks.

Mitigation Recommendations

The primary mitigation is to upgrade FileRise to version 3.10.0 or later, where the vulnerability has been patched by properly sanitizing and validating the resumableIdentifier parameter before using it in filesystem paths. Until upgrading, organizations should restrict upload permissions strictly to trusted and verified users to minimize risk. Implement monitoring and alerting on unusual file system changes or deletions within the FileRise directories. Employ application-layer firewalls or Web Application Firewalls (WAFs) to detect and block suspicious path traversal patterns in upload requests. Conduct regular audits of user permissions and review logs for anomalous upload or deletion activities. Consider isolating the FileRise server in a segmented network zone with limited access to critical infrastructure to reduce potential impact. Finally, educate administrators and users about the risk and ensure credential hygiene to prevent unauthorized access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T21:23:36.678Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2e66df4197a8e3b68b9a7

Added to database: 3/24/2026, 7:30:53 PM

Last enriched: 3/24/2026, 7:47:02 PM

Last updated: 3/24/2026, 8:31:21 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses