CVE-2026-34530 PUBLISHED

File Browser is vulnerable to Stored Cross-Site Scripting via text/template branding injection

Assigner: GitHub_M
Reserved: 30.03.2026 Published: 01.04.2026 Updated: 01.04.2026

File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the SPA index page in File Browser is vulnerable to Stored Cross-Site Scripting (XSS) via admin-controlled branding fields. An admin who sets branding.name to a malicious payload injects persistent JavaScript that executes for ALL visitors, including unauthenticated users. This issue has been patched in version 2.62.2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N
CVSS Score: 6.9

Product Status

Vendor filebrowser
Product filebrowser
Versions
  • Version < 2.62.2 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE