FileBrowser Quantum: Stored XSS in public share page via unsanitized share metadata (text/template misuse)
Stored XSS is possible via share metadata fields (e.g., title, description) that are rendered into HTML for /public/share/<hash> without context-aware escaping. The server uses text/template instead of html/template, allowing injected scripts to execute when victims visit the share URL.