Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.3

File Browser Allows Uncontrolled Hook Triggers with Negative Uploads

GHSA-ffx7-75gc-jg7c CVE-2026-32759 GHSA-ffx7-75gc-jg7c
Summary

An attacker can trigger post-upload hooks without uploading a file by sending a negative upload length. This allows unauthorized access to files and potentially malicious actions. Update the TUS handler to validate upload lengths as non-negative to prevent this issue.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
github.com filebrowser <= 2.61.1
filebrowser github.com/filebrowser/filebrowser/v2 <= 2.61.1
Original title
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. In versions 2.61.2 and below, the TUS resumable upload handl...
Original description
File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. In versions 2.61.2 and below, the TUS resumable upload handler parses the Upload-Length header as a signed 64-bit integer without validating that the value is non-negative, allowing an authenticated user to supply a negative value that instantly satisfies the upload completion condition upon the first PATCH request. This causes the server to fire after_upload exec hooks with empty or partial files, enabling an attacker to repeatedly trigger any configured hook with arbitrary filenames and zero bytes written. The impact ranges from DoS through expensive processing hooks, to command injection amplification when combined with malicious filenames, to abuse of upload-driven workflows like S3 ingestion or database inserts. Even without exec hooks enabled, the negative Upload-Length creates inconsistent cache entries where files are marked complete but contain no data. All deployments using the TUS upload endpoint (/api/tus) are affected, with the enableExec flag escalating the impact from cache inconsistency to remote command execution. At the time of publication, no patch or mitigation was available to address this issue.
ghsa CVSS4.0 5.3
Vulnerability type
CWE-190 Integer Overflow
Published: 20 Mar 2026 · Updated: 20 Mar 2026 · First seen: 16 Mar 2026