Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21540 | File Browser’s insecure JWT handling can lead to session replay attacks after logout |
Github GHSA |
GHSA-7xwp-2cpp-p8r7 | File Browser’s insecure JWT handling can lead to session replay attacks after logout |
Tue, 05 Aug 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:filebrowser:filebrowser:2.39.0:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Tue, 15 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 15 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser’s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist. | |
| Title | FileBrowser Has Insecure JWT Handling Which Allows Session Replay Attacks after Logout | |
| Weaknesses | CWE-305 CWE-385 CWE-613 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-15T18:37:40.098Z
Reserved: 2025-07-09T14:14:52.530Z
Link: CVE-2025-53826
Updated: 2025-07-15T18:37:28.657Z
Status : Analyzed
Published: 2025-07-15T18:15:24.127
Modified: 2025-08-05T18:26:27.243
Link: CVE-2025-53826
No data.
OpenCVE Enrichment
Updated: 2025-07-16T21:35:23Z
EUVD
Github GHSA