Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Filerise
Filerise filerise |
|
| CPEs | cpe:2.3:a:filerise:filerise:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Filerise
Filerise filerise |
Fri, 20 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Error311
Error311 filerise |
|
| Vendors & Products |
Error311
Error311 filerise |
Fri, 20 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.9.0, a hardcoded default encryption key (default_please_change_this_key) is used for all cryptographic operations — HMAC token generation, AES config encryption, and session tokens — allowing any unauthenticated attacker to forge upload tokens for arbitrary file upload to shared folders, and to decrypt admin configuration secrets including OIDC client secrets and SMTP passwords. FileRise uses a single key (PERSISTENT_TOKENS_KEY) for all crypto operations. The default value default_please_change_this_key is hardcoded in two places and used unless the deployer explicitly overrides the environment variable. This issue is fixed in version 3.9.0. | |
| Title | FileRise: Default Encryption Key Enables Token Forgery and Config Decryption | |
| Weaknesses | CWE-1188 CWE-798 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T18:07:22.683Z
Reserved: 2026-03-17T19:27:06.344Z
Link: CVE-2026-33072
Updated: 2026-03-20T16:04:52.939Z
Status : Analyzed
Published: 2026-03-20T09:16:15.710
Modified: 2026-03-23T15:53:41.367
Link: CVE-2026-33072
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:29:49Z