File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.1, a broken access control vulnerability in the TUS protocol DELETE endpoint allows authenticated users with only Create permission to delete arbitrary files and directories within their scope, bypassing the intended Delete permission restriction. Any multi-user deployment where administrators explicitly restrict file deletion for certain users is affected. This issue has been patched in version 2.61.1.
History

Thu, 05 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Description File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.1, a broken access control vulnerability in the TUS protocol DELETE endpoint allows authenticated users with only Create permission to delete arbitrary files and directories within their scope, bypassing the intended Delete permission restriction. Any multi-user deployment where administrators explicitly restrict file deletion for certain users is affected. This issue has been patched in version 2.61.1.
Title File Browser: TUS Delete Endpoint Bypasses Delete Permission Check
Weaknesses CWE-284
CWE-732
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-03-05T20:57:57.329Z

Updated: 2026-03-05T20:57:57.329Z

Reserved: 2026-03-04T14:44:00.714Z

Link: CVE-2026-29188

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-05T21:16:23.097

Modified: 2026-03-05T21:16:23.097

Link: CVE-2026-29188

cve-icon Redhat

No data.