Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Filerise
Filerise filerise |
|
| CPEs | cpe:2.3:a:filerise:filerise:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Filerise
Filerise filerise |
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Error311
Error311 filerise |
|
| Vendors & Products |
Error311
Error311 filerise |
Tue, 24 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FileRise is a self-hosted web file manager / WebDAV server. Prior to version 3.10.0, a broken access control issue in FileRise's ONLYOFFICE integration allows an authenticated user with read-only access to obtain a signed save callbackUrl for a file and then directly forge the ONLYOFFICE save callback to overwrite that file with attacker-controlled content. This issue has been patched in version 3.10.0. | |
| Title | FileRise ONLYOFFICE integration allows read-only users to overwrite files via forged save callback | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T20:07:58.035Z
Reserved: 2026-03-18T21:23:36.678Z
Link: CVE-2026-33330
Updated: 2026-03-24T20:06:41.844Z
Status : Analyzed
Published: 2026-03-24T20:16:28.387
Modified: 2026-03-26T11:58:39.460
Link: CVE-2026-33330
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:20:39Z