{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T08:33:52.162","vulnerabilities":[{"cve":{"id":"CVE-2025-52997","sourceIdentifier":"security-advisories@github.com","published":"2025-06-30T20:15:25.847","lastModified":"2025-08-04T18:15:35.313","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.34.1, a missing password policy and brute-force protection makes the authentication process insecure. Attackers could mount a brute-force attack to retrieve the passwords of all accounts in a given instance. This issue has been patched in version 2.34.1."},{"lang":"es","value":"File Browser proporciona una interfaz de gestión de archivos dentro de un directorio específico y permite cargar, eliminar, previsualizar, renombrar y editar archivos. Antes de la versión 2.34.1, la falta de una política de contraseñas y la protección contra ataques de fuerza bruta hacían inseguro el proceso de autenticación. Los atacantes podían realizar un ataque de fuerza bruta para recuperar las contraseñas de todas las cuentas en una instancia dada. Este problema se ha corregido en la versión 2.34.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-307"},{"lang":"en","value":"CWE-521"},{"lang":"en","value":"CWE-1392"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:filebrowser:filebrowser:*:*:*:*:*:*:*:*","versionEndExcluding":"2.34.1","matchCriteriaId":"722408D2-65E2-422E-8B39-30C43A569C5C"}]}]}],"references":[{"url":"https://github.com/filebrowser/filebrowser/commit/bf37f88c32222ad9c186482bb97338a9c9b4a93c","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/filebrowser/filebrowser/security/advisories/GHSA-cm2r-rg7r-p7gg","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250327-01_Filebrowser_Insecure_Password_Handling","source":"security-advisories@github.com"}]}}]}