Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33330: CWE-863: Incorrect Authorization in error311 FileRise

0
High
VulnerabilityCVE-2026-33330cvecve-2026-33330cwe-863
Published: Tue Mar 24 2026 (03/24/2026, 19:15:03 UTC)
Source: CVE Database V5
Vendor/Project: error311
Product: FileRise

Description

CVE-2026-33330 is a high-severity broken access control vulnerability in FileRise versions prior to 3. 10. 0, specifically in its ONLYOFFICE integration. Authenticated users with read-only access can exploit this flaw to obtain a signed save callbackUrl and forge save callbacks, allowing them to overwrite files with malicious content. This vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires authentication but no user interaction beyond that. The issue has been patched in version 3. 10. 0. Organizations using vulnerable FileRise versions should upgrade immediately and review access controls to mitigate risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:33:45 UTC

Technical Analysis

FileRise is a self-hosted web file manager and WebDAV server that integrates with ONLYOFFICE for document editing. In versions prior to 3.10.0, a broken access control vulnerability (CWE-863) exists in the ONLYOFFICE integration component. Specifically, an authenticated user with read-only permissions can retrieve a signed save callbackUrl associated with a file. This signed URL is intended to securely authorize save operations from ONLYOFFICE back to FileRise. However, due to improper authorization checks, the attacker can forge the ONLYOFFICE save callback request using the obtained callbackUrl, enabling them to overwrite the target file with arbitrary, attacker-controlled content. This effectively escalates their privileges from read-only to write capabilities on files they should not be able to modify. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 7.1 (high), reflecting the network attack vector, low attack complexity, required privileges (authenticated user), no user interaction, unchanged scope, limited confidentiality impact, but high integrity impact, and no availability impact. The issue has been addressed and patched in FileRise version 3.10.0. No known exploits in the wild have been reported as of the publication date.

Potential Impact

This vulnerability allows authenticated users with only read permissions to escalate their privileges and modify files arbitrarily, compromising data integrity and potentially confidentiality if sensitive files are overwritten or replaced with malicious content. For organizations relying on FileRise for secure file management and collaboration, this can lead to unauthorized data tampering, loss of trust in document authenticity, and potential downstream impacts such as malware injection or data corruption. Since FileRise is self-hosted, organizations with exposed instances accessible over the network are at risk. The lack of availability impact means systems remain operational, but the integrity breach can have serious consequences for compliance, auditing, and operational security. Attackers exploiting this flaw could target sensitive documents, configuration files, or scripts, leading to broader compromise or lateral movement within the network.

Mitigation Recommendations

The primary mitigation is to upgrade FileRise to version 3.10.0 or later, where the vulnerability is patched. Until upgrade is possible, organizations should restrict access to FileRise instances to trusted users only and enforce strict authentication and authorization policies. Review and limit read-only user permissions to minimize exposure. Network-level controls such as IP whitelisting or VPN access can reduce attack surface. Monitoring and logging of ONLYOFFICE save callback requests should be enabled to detect suspicious activity or unauthorized file modifications. Additionally, implement file integrity monitoring to detect unexpected changes. If possible, disable ONLYOFFICE integration temporarily until the patch is applied. Educate users about the risk of unauthorized file modifications and encourage reporting of anomalies. Regularly audit access logs and verify file integrity to identify potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T21:23:36.678Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2e66df4197a8e3b68b9ac

Added to database: 3/24/2026, 7:30:53 PM

Last enriched: 3/31/2026, 8:33:45 PM

Last updated: 5/7/2026, 6:32:42 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses