Логотип exploitDog
bind:CVE-2025-52903
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-52903

Количество 2

Количество 2

nvd логотип

CVE-2025-52903

8 месяцев назад

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0, the Command Execution feature of File Browser only allows the execution of shell command which have been predefined on a user-specific allowlist. Many tools allow the execution of arbitrary different commands, rendering this limitation void. The concrete impact depends on the commands being granted to the attacker, but the large number of standard commands allowing the execution of subcommands makes it likely that every user having the `Execute commands` permissions can exploit this vulnerability. Everyone who can exploit it will have full code execution rights with the uid of the server process. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possi

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-3q2w-42mv-cph4

8 месяцев назад

filebrowser Allows Shell Commands to Spawn Other Commands

CVSS3: 8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-52903

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0, the Command Execution feature of File Browser only allows the execution of shell command which have been predefined on a user-specific allowlist. Many tools allow the execution of arbitrary different commands, rendering this limitation void. The concrete impact depends on the commands being granted to the attacker, but the large number of standard commands allowing the execution of subcommands makes it likely that every user having the `Execute commands` permissions can exploit this vulnerability. Everyone who can exploit it will have full code execution rights with the uid of the server process. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possi

CVSS3: 8
0%
Низкий
8 месяцев назад
github логотип
GHSA-3q2w-42mv-cph4

filebrowser Allows Shell Commands to Spawn Other Commands

CVSS3: 8
0%
Низкий
8 месяцев назад

Уязвимостей на страницу