Skip to content

x/vulndb: potential Go vuln in github.com/filebrowser/filebrowser/v2: GHSA-6jqf-mv7m-3q7p #4118

@GoVulnBot

Description

@GoVulnBot

Advisory GHSA-6jqf-mv7m-3q7p references a vulnerability in the following Go modules:

Module
github.com/filebrowser/filebrowser
github.com/filebrowser/filebrowser/v2

Description:
The standard library net/http package dependency used by File Browser improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. I can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext.

See https://nvd.nist.gov/vuln/detail/CVE-2025-22871 for more details.

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/filebrowser/filebrowser
      non_go_versions:
        - introduced: TODO (earliest fixed "2.45.2", vuln range "<= 2.45.1")
      vulnerable_at: 1.11.0
    - module: github.com/filebrowser/filebrowser/v2
      vulnerable_at: 2.45.3
summary: |-
    File Browser has risk of HTTP Request/Response smuggling through vulnerable
    dependency in github.com/filebrowser/filebrowser
ghsas:
    - GHSA-6jqf-mv7m-3q7p
references:
    - advisory: https://github.com/advisories/GHSA-6jqf-mv7m-3q7p
    - advisory: https://github.com/filebrowser/filebrowser/security/advisories/GHSA-6jqf-mv7m-3q7p
    - web: https://nvd.nist.gov/vuln/detail/CVE-2025-22871
source:
    id: GHSA-6jqf-mv7m-3q7p
    created: 2025-11-13T23:01:09.978336533Z
review_status: UNREVIEWED

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions