Vulnerability Description
FileRise is a self-hosted web file manager / WebDAV server. Versions prior to 2.7.1 are vulnerable to Stored Cross-Site Scripting (XSS) due to unsafe handling of browser-renderable user uploads when served through the sharing and download endpoints. An attacker who can get a crafted SVG (primary) or HTML (secondary) file stored in a FileRise instance can cause JavaScript execution when a victim opens a generated share link (and in some cases via the direct download endpoint). This impacts share links (`/api/file/share.php`) and direct file access / download path (`/api/file/download.php`), depending on browser/content-type behavior. Version 2.7.1 fixes the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Filerise | Filerise | < 2.7.1 |
Related Weaknesses (CWE)
References
- https://github.com/error311/FileRise/security/advisories/GHSA-35pp-ggh6-c59cExploitThird Party Advisory
FAQ
What is CVE-2025-68116?
CVE-2025-68116 is a vulnerability with a CVSS score of 8.9 (HIGH). FileRise is a self-hosted web file manager / WebDAV server. Versions prior to 2.7.1 are vulnerable to Stored Cross-Site Scripting (XSS) due to unsafe handling of browser-renderable user uploads when s...
How severe is CVE-2025-68116?
CVE-2025-68116 has been rated HIGH with a CVSS base score of 8.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-68116?
Check the references section above for vendor advisories and patch information. Affected products include: Filerise Filerise.