CVE-2026-33330 Overview
CVE-2026-33330 is a broken access control vulnerability affecting FileRise, a self-hosted web file manager and WebDAV server. Prior to version 3.10.0, a flaw in FileRise's ONLYOFFICE integration allows an authenticated user with read-only access to obtain a signed save callbackUrl for a file and then directly forge the ONLYOFFICE save callback to overwrite that file with attacker-controlled content. This vulnerability enables unauthorized file modification, potentially leading to data integrity compromise, malicious content injection, or further exploitation within affected environments.
Critical Impact
Authenticated attackers with minimal privileges can bypass access controls to overwrite arbitrary files with malicious content, compromising data integrity and potentially enabling further attacks.
Affected Products
- FileRise versions prior to 3.10.0
- FileRise installations with ONLYOFFICE integration enabled
- Self-hosted FileRise/WebDAV deployments
Discovery Timeline
- 2026-03-24 - CVE-2026-33330 published to NVD
- 2026-03-26 - Last updated in NVD database
Technical Details for CVE-2026-33330
Vulnerability Analysis
This vulnerability is classified as CWE-863 (Incorrect Authorization), where the application fails to properly enforce access control checks in the ONLYOFFICE document editing integration. The core issue lies in how FileRise handles the callback mechanism used by ONLYOFFICE to save edited documents back to the server.
When a user opens a document for editing through ONLYOFFICE, FileRise generates a signed callback URL that ONLYOFFICE uses to send the modified document back to the server. The vulnerability exists because the access control validation performed when generating this signed URL does not adequately restrict users with read-only permissions from obtaining a valid save callback URL. Once an attacker with read-only access obtains this signed URL, they can craft a forged ONLYOFFICE save callback request to overwrite the target file with arbitrary content.
The attack requires network access and authentication (even with minimal privileges), but does not require user interaction, making it relatively straightforward to exploit in environments where multiple users have varying permission levels.
Root Cause
The root cause of CVE-2026-33330 is improper authorization validation within the ONLYOFFICE integration module. The application fails to differentiate between read and write permissions when generating the signed save callback URL, allowing read-only users to obtain credentials that should only be available to users with write access. This represents a classic broken access control pattern where permission checks are insufficient at a critical authorization boundary.
Attack Vector
The attack leverages the network-accessible ONLYOFFICE integration endpoint. An authenticated attacker with read-only access follows these steps:
- Authenticate to FileRise with a low-privileged account that has read-only access to target files
- Initiate a document editing session through the ONLYOFFICE integration for a target file
- Capture the signed save callbackUrl provided by FileRise during the editing session initialization
- Craft a malicious ONLYOFFICE-formatted save callback request containing attacker-controlled content
- Submit the forged callback request to the captured URL, bypassing access control checks
- The target file is overwritten with the attacker's content despite having only read permissions
For technical implementation details, refer to the GitHub Security Advisory GHSA-6c3j-f4x4-36m3.
Detection Methods for CVE-2026-33330
Indicators of Compromise
- Unexpected file modifications by users who should only have read access
- ONLYOFFICE callback requests originating from unusual IP addresses or user agents
- Audit log entries showing file write operations for read-only user accounts
- Discrepancies between expected file content and actual content on disk
Detection Strategies
- Implement audit logging for all file write operations with user permission level tracking
- Monitor ONLYOFFICE callback endpoints for requests from authenticated users with insufficient privileges
- Deploy file integrity monitoring on sensitive documents to detect unauthorized modifications
- Review application logs for save callback URL generation events correlated with read-only user sessions
Monitoring Recommendations
- Configure alerts for file modification events by users with read-only ACL entries
- Enable detailed request logging on ONLYOFFICE integration endpoints
- Implement real-time monitoring for authorization failures followed by successful write operations
- Establish baseline metrics for normal ONLYOFFICE callback patterns to identify anomalous activity
How to Mitigate CVE-2026-33330
Immediate Actions Required
- Upgrade FileRise to version 3.10.0 or later immediately
- Audit file access logs for any unauthorized modifications by read-only users
- Review user permission assignments and restrict ONLYOFFICE integration access where not required
- Consider temporarily disabling ONLYOFFICE integration until the patch is applied
Patch Information
FileRise has addressed this vulnerability in version 3.10.0. The fix implements proper authorization validation when generating save callback URLs, ensuring that only users with write permissions can obtain valid credentials for file modification callbacks.
The security patch is available through the GitHub Release v3.10.0. Detailed information about the fix can be found in the security commit 3871f9fd1661688bed4f7dd23912be0ebf50973c.
Workarounds
- Disable ONLYOFFICE integration entirely until patching is possible
- Restrict network access to ONLYOFFICE callback endpoints using firewall rules
- Implement additional authentication layers for document editing functionality
- Remove read-only user access to sensitive files that could be targeted for overwrite attacks
# Verify FileRise version after upgrade
cat /path/to/filerise/version.txt
# Expected output: 3.10.0 or higher
# Review user permissions for ONLYOFFICE integration access
# Check configuration files for integration settings
grep -r "onlyoffice" /path/to/filerise/config/
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


