Improper Authorization Affecting github.com/filebrowser/filebrowser/http package, versions >=0.0.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMFILEBROWSERFILEBROWSERHTTP-14038267
  • published16 Nov 2025
  • disclosed13 Nov 2025
  • creditbbodisteanu-hacken

Introduced: 13 Nov 2025

NewCVE-2025-64523  (opens in a new tab)
CWE-285  (opens in a new tab)

How to fix?

Upgrade github.com/filebrowser/filebrowser/http to version or higher.

Overview

Affected versions of this package are vulnerable to Improper Authorization via the shareDeleteHandler function, which handles deletion requests based solely on the share hash, and does not verify whether the link.UserID matches the currently authenticated user's ID (d.user.ID). An attacker can delete other users' shared links without proper authorization by sending crafted DELETE requests with a valid authentication token.

PoC

Prerequisites: There are two authenticated users (User A and User B), both with share permissions.

  1. User A generates a shareable link and receives a share hash (e.g., MEEuZK-v).

  2. User B logs in and acquires a JWT token.

  3. Using their JWT token, User B sends a DELETE request to /api/share/MEEuZK-v.

  4. It’s observed that User B can delete User A’s share without being authorized.

DELETE /api/share/MEEuZK-v HTTP/1.1

Host: filebrowser.local Content-Type: application/json

CVSS Base Scores

version 4.0
version 3.1