CVE-2026-33329: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in error311 FileRise
CVE-2026-33329 is a high-severity path traversal vulnerability in FileRise, a self-hosted web file manager and WebDAV server. Versions from 1. 0. 1 up to but not including 3. 10. 0 improperly handle the resumableIdentifier parameter in the chunked upload handler, allowing authenticated users with upload permissions to write files to arbitrary directories. This flaw also enables deletion of arbitrary directories during post-assembly cleanup and probing of file or directory existence. Exploitation requires authentication but no user interaction beyond upload permission. The vulnerability impacts integrity and availability of the server filesystem. It has been patched in version 3.
AI Analysis
Technical Summary
CVE-2026-33329 is a path traversal vulnerability categorized under CWE-22 and CWE-73 affecting FileRise versions 1.0.1 through 3.9.x. The issue arises because the resumableIdentifier parameter, used in the Resumable.js chunked upload handler (UploadModel::handleUpload()), is concatenated directly into filesystem paths without any sanitization or validation. This allows an authenticated user with upload permissions to manipulate the pathname to escape the intended upload directory and write files anywhere on the server's filesystem. Additionally, the vulnerability permits deletion of arbitrary directories during the post-assembly cleanup phase, which can be triggered after file uploads complete. Attackers can also probe for the existence of files or directories, potentially aiding further attacks or reconnaissance. The vulnerability does not require user interaction beyond having upload rights, but it does require authentication, limiting exposure to authorized users. The CVSS v3.1 score is 8.1 (high), reflecting network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts. The vulnerability was publicly disclosed on March 24, 2026, and fixed in FileRise version 3.10.0. No known exploits have been reported in the wild to date.
Potential Impact
This vulnerability poses a significant risk to organizations using vulnerable versions of FileRise. An attacker with upload permissions can overwrite or create arbitrary files anywhere on the server, potentially leading to code execution, defacement, or persistence mechanisms. The ability to delete arbitrary directories can cause data loss and service disruption, impacting availability. Probing file existence can facilitate further attacks by revealing sensitive information about the server's filesystem structure. Since FileRise is often used to manage and share files in enterprise or hosting environments, exploitation could compromise critical data integrity and availability. The requirement for authentication limits the attack surface but insider threats or compromised credentials could enable exploitation. Organizations relying on FileRise for file management or WebDAV services face risks of unauthorized data manipulation, service outages, and potential lateral movement within their networks.
Mitigation Recommendations
The primary mitigation is to upgrade FileRise to version 3.10.0 or later, where the vulnerability has been patched by properly sanitizing and validating the resumableIdentifier parameter before using it in filesystem paths. Until upgrading, organizations should restrict upload permissions strictly to trusted and verified users to minimize risk. Implement monitoring and alerting on unusual file system changes or deletions within the FileRise directories. Employ application-layer firewalls or Web Application Firewalls (WAFs) to detect and block suspicious path traversal patterns in upload requests. Conduct regular audits of user permissions and review logs for anomalous upload or deletion activities. Consider isolating the FileRise server in a segmented network zone with limited access to critical infrastructure to reduce potential impact. Finally, educate administrators and users about the risk and ensure credential hygiene to prevent unauthorized access.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, Netherlands, India
CVE-2026-33329: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in error311 FileRise
Description
CVE-2026-33329 is a high-severity path traversal vulnerability in FileRise, a self-hosted web file manager and WebDAV server. Versions from 1. 0. 1 up to but not including 3. 10. 0 improperly handle the resumableIdentifier parameter in the chunked upload handler, allowing authenticated users with upload permissions to write files to arbitrary directories. This flaw also enables deletion of arbitrary directories during post-assembly cleanup and probing of file or directory existence. Exploitation requires authentication but no user interaction beyond upload permission. The vulnerability impacts integrity and availability of the server filesystem. It has been patched in version 3.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33329 is a path traversal vulnerability categorized under CWE-22 and CWE-73 affecting FileRise versions 1.0.1 through 3.9.x. The issue arises because the resumableIdentifier parameter, used in the Resumable.js chunked upload handler (UploadModel::handleUpload()), is concatenated directly into filesystem paths without any sanitization or validation. This allows an authenticated user with upload permissions to manipulate the pathname to escape the intended upload directory and write files anywhere on the server's filesystem. Additionally, the vulnerability permits deletion of arbitrary directories during the post-assembly cleanup phase, which can be triggered after file uploads complete. Attackers can also probe for the existence of files or directories, potentially aiding further attacks or reconnaissance. The vulnerability does not require user interaction beyond having upload rights, but it does require authentication, limiting exposure to authorized users. The CVSS v3.1 score is 8.1 (high), reflecting network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts. The vulnerability was publicly disclosed on March 24, 2026, and fixed in FileRise version 3.10.0. No known exploits have been reported in the wild to date.
Potential Impact
This vulnerability poses a significant risk to organizations using vulnerable versions of FileRise. An attacker with upload permissions can overwrite or create arbitrary files anywhere on the server, potentially leading to code execution, defacement, or persistence mechanisms. The ability to delete arbitrary directories can cause data loss and service disruption, impacting availability. Probing file existence can facilitate further attacks by revealing sensitive information about the server's filesystem structure. Since FileRise is often used to manage and share files in enterprise or hosting environments, exploitation could compromise critical data integrity and availability. The requirement for authentication limits the attack surface but insider threats or compromised credentials could enable exploitation. Organizations relying on FileRise for file management or WebDAV services face risks of unauthorized data manipulation, service outages, and potential lateral movement within their networks.
Mitigation Recommendations
The primary mitigation is to upgrade FileRise to version 3.10.0 or later, where the vulnerability has been patched by properly sanitizing and validating the resumableIdentifier parameter before using it in filesystem paths. Until upgrading, organizations should restrict upload permissions strictly to trusted and verified users to minimize risk. Implement monitoring and alerting on unusual file system changes or deletions within the FileRise directories. Employ application-layer firewalls or Web Application Firewalls (WAFs) to detect and block suspicious path traversal patterns in upload requests. Conduct regular audits of user permissions and review logs for anomalous upload or deletion activities. Consider isolating the FileRise server in a segmented network zone with limited access to critical infrastructure to reduce potential impact. Finally, educate administrators and users about the risk and ensure credential hygiene to prevent unauthorized access.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-18T21:23:36.678Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c2e66df4197a8e3b68b9a7
Added to database: 3/24/2026, 7:30:53 PM
Last enriched: 3/24/2026, 7:47:02 PM
Last updated: 3/24/2026, 8:31:21 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.