CVE-2026-44542: Critical Path Traversal in FileBrowser Quantum
The National Vulnerability Database has detailed CVE-2026-44542, a critical path traversal vulnerability impacting FileBrowser Quantum, a popular self-hosted web-based file manager. Prior to versions 1.3.1-stable and 1.3.9-beta, the application mishandles attacker-controlled path input by joining it with a trusted base path before proper sanitization. This allows traversal sequences, like ../, to escape the intended shared directory boundary.
This flaw enables an unauthenticated attacker, provided they possess a valid public share hash with delete permissions, to delete arbitrary files outside the configured shared directory. The impact is confined to the share owner’s storage scope, but the ability to perform unauthenticated arbitrary file deletion is a significant risk. The vulnerability affects the public/api/resources and public/api/resources/bulk endpoints.
The CVSSv3.1 score of 9.1 (Critical) underscores the severity, with a vector indicating network-based attacks requiring no privileges or user interaction, leading to high integrity and availability impacts. Defenders must prioritize patching, as this type of vulnerability is a favorite for initial access or destructive actions within an already compromised environment.
What This Means For You
- If your organization uses FileBrowser Quantum, immediately verify your version. If it's prior to 1.3.1-stable or 1.3.9-beta, you are exposed to unauthenticated arbitrary file deletion. Patching is non-negotiable. Additionally, audit logs for any suspicious file deletion activities, especially those originating from public share links. Review your public share configurations to ensure delete permissions are only granted when absolutely necessary.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-44542: FileBrowser Quantum Path Traversal Deletion
title: CVE-2026-44542: FileBrowser Quantum Path Traversal Deletion
id: scw-2026-05-14-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-44542 by targeting the /public/api/resources and /public/api/resources/bulk endpoints with a DELETE method and a URI query containing path traversal sequences (../). This indicates an unauthenticated attacker attempting to delete arbitrary files outside the shared directory.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-44542/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|startswith:
- '/public/api/resources'
- '/public/api/resources/bulk'
cs-method:
- 'DELETE'
cs-uri-query|contains:
- '../'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-44542 | Path Traversal | FileBrowser Quantum versions prior to 1.3.1-stable and 1.3.9-beta |
| CVE-2026-44542 | Path Traversal | Vulnerable endpoints: public/api/resources and public/api/resources/bulk |
| CVE-2026-44542 | Path Traversal | Affected component: attacker-controlled path input joined with trusted base path prior to sanitization |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 21:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.