github.com/filebrowser/filebrowser

govv1.11.0

πŸ“‚ Web File Browser

License Apache-2.0permissive47 versions247 maintainers0 deps34,375 weekly dl
filebrowser/filebrowser
35
/ 100
Health
update required

github.com/filebrowser/[email protected] has vulnerabilities β€” update to latest

Update to >= 2.62.0 to fix known vulnerabilities

  • Low health score (35/100)
  • 5 high severity vulnerabilities
Health breakdown0 – 100
0/25
maintenance
10/20
popularity
0/25
security
12/15
maturity
13/15
community
Vulnerabilities
31
5 high4 medium22 low
Advisories (31)
SeverityIDSummaryFixed in
highCVE-2025-52903filebrowser Allows Shell Commands to Spawn Other Commands2.33.10
lowCVE-2025-52996File Browser's password protection of links is bypassableβ€”
mediumCVE-2026-23849File Browser Vulnerable to Username Enumeration via Timing Attack in /api/login2.55.0
highCVE-2025-52902filebrowser allows Stored Cross-Site Scripting through the Markdown preview function2.33.7
highCVE-2025-53826File Browser’s insecure JWT handling can lead to session replay attacks after logoutβ€”
mediumCVE-2025-52997File Browser vulnerable to insecure password handling2.34.1
highCVE-2025-52904File Browser: Command Execution not Limited to Scopeβ€”
mediumCVE-2025-52900filebrowser Sets Insecure File Permissions2.33.7
mediumCVE-2025-52901File Browser allows sensitive data to be transferred in URL2.33.9
highCVE-2025-52995File Browser vulnerable to command execution allowlist bypass2.33.10
unknownCVE-2025-52902filebrowser allows Stored Cross-Site Scripting through the Markdown preview function in github.com/filebrowser/filebrowser2.33.7
unknownCVE-2025-52900filebrowser Sets Insecure File Permissions in github.com/filebrowser/filebrowser2.33.7
unknownCVE-2025-52903filebrowser Allows Shell Commands to Spawn Other Commands in github.com/filebrowser/filebrowser2.33.10
unknownCVE-2025-52996File Browser's password protection of links is bypassable in github.com/filebrowser/filebrowserβ€”
unknownCVE-2025-52997File Browser vulnerable to insecure password handling in github.com/filebrowser/filebrowser2.34.1
unknownCVE-2025-52904File Browser: Command Execution not Limited to Scope in github.com/filebrowser/filebrowserβ€”
unknownCVE-2025-52901File Browser allows sensitive data to be transferred in URL in github.com/filebrowser/filebrowser2.33.9
unknownCVE-2025-52995File Browser vulnerable to command execution allowlist bypass in github.com/filebrowser/filebrowser2.33.10
unknownCVE-2025-53893File Browser's Uncontrolled Memory Consumption vulnerability can enable DoS attack due to oversized file processing in github.com/filebrowser/filebrowserβ€”
unknownCVE-2025-53826File Browser’s insecure JWT handling can lead to session replay attacks after logout in github.com/filebrowser/filebrowserβ€”
... and 11 more

Health History

Dependency Tree

License Audit

API access

Get this data programmatically β€” free, no authentication.

curl https://depscope.dev/api/check/go/github.com/filebrowser/filebrowser

Last updated Β· 2019-01-05T21:26:40Z

github.com/filebrowser/filebrowser β€” Health Score 35/100 | DepScope | DepScope