Home

Description

PrivateBin is an online pastebin where the server has zero knowledge of pasted data. Versions 1.7.7 through 2.0.1 allow persistent HTML injection via the unsanitized attachment filename (attachment_name) when attachments are enabled. An attacker can modify attachment_name before encryption so that, after decryption, arbitrary HTML is inserted unescaped into the page near the file size hint, enabling redirect (e.g., meta refresh) and site defacement and related phishing attacks. Script execution is normally blocked by the recommended Content Security Policy, limiting confidentiality impact. The issue was introduced in 1.7.7 and fixed in 2.0.2. Update to 2.0.2 or later. Workarounds include enforcing the recommended CSP, deploying PrivateBin on a separate domain, or disabling attachments.

PUBLISHED Reserved 2025-10-22 | Published 2025-10-28 | Updated 2025-10-29 | Assigner GitHub_M




MEDIUM: 5.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Product status

>= 1.7.7, < 2.0.2
affected

References

github.com/...ateBin/security/advisories/GHSA-867c-p784-5q6g

github.com/PrivateBin/PrivateBin/pull/1550

github.com/...ommit/c4f8482b3072be7ae012cace1b3f5658dcc3b42e

cve.org (CVE-2025-62796)

nvd.nist.gov (CVE-2025-62796)

Download JSON