• Advisory ID: DRUPAL-SA-CONTRIB-2013-046
  • Project: Filebrowser (third-party module)
  • Version: 6.x
  • Date: 2013-May-1
  • Security risk: Highly critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Scripting


Filebrowser module allows site administrators to expose a particular file system folder and all of its subfolders with an FTP-like interface to site visitors.

The module doesn't sufficiently sanitize user input when presenting lists of files.

Because the vulnerability is Reflected Cross Site Scripting, the only mitigating factor is that an authenticated user must be tricked into visiting a specially crafted malicious url.

CVE identifier(s) issued

  • CVE-2013-2036

Versions affected

  • Filebrowser 6.x-2.x versions prior to 6.x-2.2.

Drupal core is not affected. If you do not use the contributed Filebrowser module, there is nothing you need to do.


Install the latest version:

Also see the Filebrowser project page.

Reported by

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.