Vulnerability Description
FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.9.0, a hardcoded default encryption key (default_please_change_this_key) is used for all cryptographic operations — HMAC token generation, AES config encryption, and session tokens — allowing any unauthenticated attacker to forge upload tokens for arbitrary file upload to shared folders, and to decrypt admin configuration secrets including OIDC client secrets and SMTP passwords. FileRise uses a single key (PERSISTENT_TOKENS_KEY) for all crypto operations. The default value default_please_change_this_key is hardcoded in two places and used unless the deployer explicitly overrides the environment variable. This issue is fixed in version 3.9.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Filerise | Filerise | < 3.9.0 |
Related Weaknesses (CWE)
References
- https://github.com/error311/FileRise/releases/tag/v3.9.0ProductRelease Notes
- https://github.com/error311/FileRise/security/advisories/GHSA-f4xx-57cv-mg3xExploitVendor Advisory
- https://github.com/error311/FileRise/security/advisories/GHSA-f4xx-57cv-mg3xExploitVendor Advisory
FAQ
What is CVE-2026-33072?
CVE-2026-33072 is a vulnerability with a CVSS score of 8.2 (HIGH). FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.9.0, a hardcoded default encryption key (default_please_change_this_key) is used for all cryptographic operations — H...
How severe is CVE-2026-33072?
CVE-2026-33072 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33072?
Check the references section above for vendor advisories and patch information. Affected products include: Filerise Filerise.