GHSA-ffx7-75gc-jg7c: File Browser TUS Negative Upload-Length Fires Post-Upload Hooks Prematurely
mediumvulnerability
security
Summary
A vulnerability in File Browser's TUS resumable upload handler fails to validate that the Upload-Length header is non-negative. When an attacker supplies a negative value like -1, the first PATCH request immediately triggers the completion condition (0 >= -1 is true), causing after_upload hooks (automated scripts that run after file uploads) to fire with empty or partial files. An authenticated user with upload permission can trigger these hooks repeatedly with any filename, even without actually uploading data.
Vulnerability Details
EPSS (30-day exploit probability)
EPSS: 0.0%
Disclosure Date
March 16, 2026
Classification
Attack SophisticationTrivial
Affected Packages
github.com/filebrowser/filebrowser/v2@<= 2.61.1
Original source: https://github.com/advisories/GHSA-ffx7-75gc-jg7c
First tracked: March 16, 2026 at 05:09 PM
Classified by LLM (prompt v3) · confidence: 95%