Vulnerability Description
FileRise is a self-hosted web file manager / WebDAV server. Prior to version 3.10.0, a broken access control issue in FileRise's ONLYOFFICE integration allows an authenticated user with read-only access to obtain a signed save callbackUrl for a file and then directly forge the ONLYOFFICE save callback to overwrite that file with attacker-controlled content. This issue has been patched in version 3.10.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Filerise | Filerise | < 3.10.0 |
Related Weaknesses (CWE)
References
- https://github.com/error311/FileRise/commit/3871f9fd1661688bed4f7dd23912be0ebf50Patch
- https://github.com/error311/FileRise/releases/tag/v3.10.0ProductRelease Notes
- https://github.com/error311/FileRise/security/advisories/GHSA-6c3j-f4x4-36m3ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-33330?
CVE-2026-33330 is a vulnerability with a CVSS score of 7.1 (HIGH). FileRise is a self-hosted web file manager / WebDAV server. Prior to version 3.10.0, a broken access control issue in FileRise's ONLYOFFICE integration allows an authenticated user with read-only acce...
How severe is CVE-2026-33330?
CVE-2026-33330 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33330?
Check the references section above for vendor advisories and patch information. Affected products include: Filerise Filerise.