Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.3

File Browser: Unintended Directory Access Through Malicious Path Matching

CVE-2026-35605 GHSA-5q48-q4fm-g3m6
Summary

A flaw in File Browser's access rules allows unauthorized access to unintended directories. This could be exploited by an attacker to access sensitive files. Update to version 2.63.1 to fix this issue.

What to do
  • Update github.com filebrowser to version 2.63.1.
Affected software
VendorProductAffected versionsFix available
github.com filebrowser <= 2.63.1 2.63.1
Original title
File Browser has an access rule bypass via HasPrefix without trailing separator in path matching
Original description
Hi,

The `Matches()` function in `rules/rules.go` uses `strings.HasPrefix()` without a trailing directory separator when matching paths against access rules. A rule for `/uploads` also matches `/uploads_backup/`, granting or denying access to unintended directories. Verified against v2.62.2 (commit 860c19d).

## Details

At `rules/rules.go:29-35`:

func (r *Rule) Matches(path string) bool {
if r.Regex {
return r.Regexp.MatchString(path)
}
return strings.HasPrefix(path, r.Path)
}

When a rule has `Path: "/uploads"`, any path starting with `/uploads` matches, including `/uploads_backup/secret.txt`. The regex variant at line 31 uses proper matching, but the non-regex path uses a prefix check without ensuring the match ends at a directory boundary.

The `Check()` function at `http/data.go:29-48` iterates all rules with last-match-wins semantics. No secondary validation exists beyond this prefix check.

## PoC

Admin configures: allow rule `Path: "/shared"` for a restricted user.

Filesystem contains:
- `/shared/` (intended to be accessible)
- `/shared_private/` (intended to be restricted)

User requests `/shared_private/secret.txt`:
- `strings.HasPrefix("/shared_private/secret.txt", "/shared")` returns true
- Allow rule applies
- Access granted to the unintended directory

## Impact

Authenticated users can access files in sibling directories that share a common prefix with an allowed directory, bypassing the admin's intended access configuration.

## Prior art

Prior advisories GHSA-4mh3-h929-w968 (path-based access control bypass) and GHSA-9f3r-2vgw-m8xp (path traversal in copy/rename) addressed related access control issues. This HasPrefix prefix-collision is a distinct, unreported variant.

## Suggested Fix

func (r *Rule) Matches(path string) bool {
if r.Regex {
return r.Regexp.MatchString(path)
}
prefix := r.Path
if prefix != "/" && !strings.HasSuffix(prefix, "/") {
prefix += "/"
}
return path == r.Path || strings.HasPrefix(path, prefix)
}

Koda Reef

---

**Update:** Fix submitted as PR #5889.
nvd CVSS4.0 6.3
Vulnerability type
CWE-22 Path Traversal
Published: 8 Apr 2026 · Updated: 8 Apr 2026 · First seen: 7 Apr 2026