The vulnerability is an authorization bypass in the file-sharing mechanism of File Browser. The root cause is an insufficient permission check in the withPermShare function located in http/share.go. This middleware function was responsible for authorizing the creation of public share links. In the vulnerable versions, it only verified if a user had Perm.Share, completely omitting a check for Perm.Download.
This flaw allowed a malicious or compromised user, who is explicitly denied download privileges, to generate a public, unauthenticated download link for any file they have access to. The exploitation is completed by accessing the public download endpoints, handled by handler.ServeHTTP and handler.download in http/public.go. These handlers do not perform any secondary permission checks on the file owner at the time of the download; they operate under the assumption that a valid share link is sufficient authorization.
The patch, committed in version 2.62.0, rectifies this by adding the necessary !d.user.Perm.Download check within the withPermShare function. This ensures that a user must have both share and download permissions to create a shareable link, effectively closing the bypass.