We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users. This is fixed in version 1.18.7.
Reserved 2025-07-25 | Published 2025-07-31 | Updated 2025-07-31 | Assigner GitHub_MCWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
github.com/...yparty/security/advisories/GHSA-8mx2-rjh8-q3jq
github.com/...ommit/a8705e611d05eeb22be5d3d7d9ab5c020fe54c62
github.com/9001/copyparty/releases/tag/v1.18.7
Support options