Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 04 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Filerise filerise
|
|
| CPEs | cpe:2.3:a:filerise:filerise:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Filerise filerise
|
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Filerise
Filerise filrise |
|
| Vendors & Products |
Filerise
Filerise filrise |
Mon, 20 Oct 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Oct 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FileRise is a self-hosted web-based file manager with multi-file upload, editing, and batch operations. Prior to version 1.4.0, a business logic flaw in FileRise’s file/folder handling allows low-privilege users to perform unauthorized operations (view/delete/modify) on files created by other users. The root cause was inferring ownership/visibility from folder names (e.g., a folder named after a username) and missing server-side authorization/ownership checks across file operation endpoints. This amounted to an IDOR pattern: an attacker could operate on resources identified only by predictable names. This issue has been patched in version 1.4.0 and further hardened in version 1.5.0. A workaround for this issue involves restricting non-admin users to read-only or disable delete/rename APIs server-side, avoid creating top-level folders named after other usernames, and adding server-side checks that verify ownership before delete/rename/move. | |
| Title | FileRise improper ownership/permission validation allowed cross-tenant file operations | |
| Weaknesses | CWE-280 CWE-284 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-20T18:05:53.350Z
Reserved: 2025-10-15T15:03:28.133Z
Link: CVE-2025-62509
Updated: 2025-10-20T18:05:46.250Z
Status : Analyzed
Published: 2025-10-20T18:15:40.050
Modified: 2025-12-04T19:13:01.170
Link: CVE-2025-62509
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:39:42Z