CVE-2026-29188 PUBLISHED

File Browser: TUS Delete Endpoint Bypasses Delete Permission Check

Assigner: GitHub_M
Reserved: 04.03.2026 Published: 05.03.2026 Updated: 06.03.2026

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.1, a broken access control vulnerability in the TUS protocol DELETE endpoint allows authenticated users with only Create permission to delete arbitrary files and directories within their scope, bypassing the intended Delete permission restriction. Any multi-user deployment where administrators explicitly restrict file deletion for certain users is affected. This issue has been patched in version 2.61.1.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor filebrowser
Product filebrowser
Versions
  • Version < 2.61.1 is affected

References

Problem Types

  • CWE-732: Incorrect Permission Assignment for Critical Resource CWE
  • CWE-284: Improper Access Control CWE