Home

Description

Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users. This is fixed in version 1.18.7.

PUBLISHED Reserved 2025-07-25 | Published 2025-07-31 | Updated 2025-07-31 | Assigner GitHub_M




MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Product status

< 1.18.7
affected

References

github.com/...yparty/security/advisories/GHSA-8mx2-rjh8-q3jq

github.com/...ommit/a8705e611d05eeb22be5d3d7d9ab5c020fe54c62

github.com/9001/copyparty/releases/tag/v1.18.7

cve.org (CVE-2025-54589)

nvd.nist.gov (CVE-2025-54589)

Download JSON