We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54589

copyparty Reflected XSS via Filter Parameter



Description

Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users. This is fixed in version 1.18.7.

Reserved 2025-07-25 | Published 2025-07-31 | Updated 2025-07-31 | Assigner GitHub_M


MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Product status

< 1.18.7
affected

References

github.com/...yparty/security/advisories/GHSA-8mx2-rjh8-q3jq

github.com/...ommit/a8705e611d05eeb22be5d3d7d9ab5c020fe54c62

github.com/9001/copyparty/releases/tag/v1.18.7

cve.org (CVE-2025-54589)

nvd.nist.gov (CVE-2025-54589)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54589

Support options

Helpdesk Chat, Email, Knowledgebase