Upstream information

CVE-2025-52901 at MITRE

Description

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.9, access tokens are used as GET parameters. The JSON Web Token (JWT) which is used as a session identifier will get leaked to anyone having access to the URLs accessed by the user. This will give an attacker full access to a user's account and, in consequence, to all sensitive files the user has access to. This issue has been patched in version 2.33.9.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v3 Scores
CVSS detail CNA (GitHub) National Vulnerability Database
Base Score 4.5 6.5
Vector CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector Adjacent Network Network
Attack Complexity Low Low
Privileges Required High Low
User Interaction None None
Scope Unchanged Unchanged
Confidentiality Impact High High
Integrity Impact None None
Availability Impact None None
CVSSv3 Version 3.1 3.1
No SUSE Bugzilla entries cross referenced.

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 16.0
  • govulncheck-vulndb >= 0.0.20250814T182633-160000.1.2
Patchnames:
SUSE Linux Enterprise Server 16.0 GA govulncheck-vulndb-0.0.20250814T182633-160000.1.2
openSUSE Tumbleweed
  • govulncheck-vulndb >= 0.0.20250730T213748-1.1
Patchnames:
openSUSE-Tumbleweed-2025-15405


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.

Product(s) Source package State
Products under general support and receiving all security fixes.
SUSE Linux Enterprise Server 16.0 govulncheck-vulndb Affected
SUSE Linux Enterprise Server 16.1 govulncheck-vulndb Affected
SUSE Linux Enterprise Server for SAP applications 16.0 govulncheck-vulndb Affected
SUSE Linux Enterprise Server for SAP applications 16.1 govulncheck-vulndb Affected


SUSE Timeline for this CVE

CVE page created: Tue Jul 1 00:01:57 2025
CVE page last modified: Sat May 9 11:33:41 2026