CVE-2025-52901
Wolfi vulnerability analysis and mitigation

Overview

CVE-2025-52901 affects File Browser versions prior to 2.33.9, where access tokens are used as GET parameters. The vulnerability involves the exposure of JSON Web Tokens (JWT) used as session identifiers through URLs accessed by users. The vulnerability was discovered on March 27, 2025, disclosed to the project on April 29, 2025, and patched with the release of version 2.33.9 on June 26, 2025 (GitHub Advisory).

Technical details

The vulnerability is classified as CWE-598 (Use of GET Request Method With Sensitive Query Strings). The CVSS v3.1 base score is 4.5 (Medium) with the vector string CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N. The issue occurs when sensitive authentication tokens are transmitted as GET parameters in URLs, which is considered a security anti-pattern (GitHub Advisory).

Impact

The vulnerability allows attackers with access to URLs accessed by users to obtain JWT session identifiers. This exposure grants full access to a user's account and consequently to all sensitive files the user has access to. The tokens can be leaked through various channels including browser history, server access logs, proxy servers, and third-party servers via HTTP referrer headers (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in File Browser version 2.33.9. The fix involves removing auth tokens from GET parameters and implementing proper transmission of sensitive data through HTTP headers or the HTTP body only. Users should upgrade to version 2.33.9 or later to address this security issue (GitHub Advisory, Release Notes).

Additional resources


SourceThis report was generated using AI

Related Wolfi vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23884HIGH7.7
  • WolfiWolfi
  • freerdp-libs
NoYesJan 19, 2026
CVE-2026-23883HIGH7.7
  • WolfiWolfi
  • freerdp
NoYesJan 19, 2026
CVE-2026-23732MEDIUM5.5
  • WolfiWolfi
  • freerdp
NoYesJan 19, 2026
CVE-2026-23849MEDIUM5.3
  • WolfiWolfi
  • github.com/filebrowser/filebrowser/v2
NoYesJan 19, 2026
CVE-2025-15281N/AN/A
  • WolfiWolfi
  • glibc-langpack-anp
NoYesJan 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management