File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser’s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Tue, 15 Jul 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser’s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist. | |
Title | FileBrowser Has Insecure JWT Handling Which Allows Session Replay Attacks after Logout | |
Weaknesses | CWE-305 CWE-385 CWE-613 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-15T18:12:24.289Z
Updated: 2025-07-15T18:37:40.098Z
Reserved: 2025-07-09T14:14:52.530Z
Link: CVE-2025-53826

Updated: 2025-07-15T18:37:28.657Z

Status : Awaiting Analysis
Published: 2025-07-15T18:15:24.127
Modified: 2025-07-15T20:07:28.023
Link: CVE-2025-53826

No data.