Miggo Logo

CVE-2025-52997: File Browser vulnerable to insecure password handling

5.9

CVSS Score
3.1

Basic Information

EPSS Score
0.13579%
Published
6/30/2025
Updated
6/30/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/filebrowser/filebrowser/v2go<= 2.34.02.34.1
github.com/filebrowser/filebrowsergo<= 1.11.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability analysis identified that the core issue was weak password enforcement within the File Browser application, as described in CVE-2025-52997. The provided patch addresses this by strengthening password validation logic.

The root cause was traced to the users.HashAndValidatePwd function in users/password.go. This function's validation was insufficient as it only checked for minimum password length, allowing trivial and common passwords to be set. The security patch replaced this function with users.ValidateAndHashPwd, which introduces a crucial security enhancement: checking the password against a list of known common passwords to prevent users from choosing weak credentials.

Several HTTP handlers were identified as vulnerable because they directly invoked this weak validation function, exposing the application's password-setting functionality to abuse. These handlers are the primary entry points for exploiting this vulnerability via the web interface:

  • http.userPutHandler (PUT /api/users/{id}): Allowed existing users to change their password to a weak one. This is the exact scenario demonstrated in the provided proof-of-concept.
  • http.userPostHandler (POST /api/users): Allowed administrators to create new users with weak passwords.
  • http.signupHandler (POST /api/signup): Allowed new users to register with weak passwords.

By patching these handlers to call the new, more secure users.ValidateAndHashPwd function, the fix ensures that all methods of setting or updating a password within the application are subject to the same strong validation rules.

It is important to note that the vulnerability description also mentions a lack of brute-force protection on the login endpoint (/api/login). The analyzed commit does not appear to address this issue, focusing solely on improving password complexity requirements (CWE-521).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Summ*ry ## *ll us*r ***ounts *ut**nti**t* tow*r*s * **il* *rows*r* inst*n** wit* * p*sswor*. * missin* p*sswor* poli*y *n* *rut*-*or** prot**tion m*k*s it impossi*l* *or **ministr*tors to prop*rly s**ur* t** *ut**nti**tion pro**ss. ## Imp**t ##

Reasoning

T** vuln*r**ility *n*lysis i**nti*i** t**t t** *or* issu* w*s w**k p*sswor* *n*or**m*nt wit*in t** *il* *rows*r *ppli**tion, *s **s*ri*** in *V*-****-*****. T** provi*** p*t** ***r*ss*s t*is *y str*n*t**nin* p*sswor* v*li**tion lo*i*. T** root **us*