Home

Description

ThinkDashboard is a self-hosted bookmark dashboard built with Go and vanilla JavaScript. In versions 0.6.7 and below, an attacker can upload any file they wish to the /data directory of the web application via the backup import feature. When importing a backup, an attacker can first choose a .zip file to bypass the client-side file-type verification. This could lead to stored XSS, or be used for other nefarious purposes such as malware distribution. This issue is fixed in version 0.6.8.

PUBLISHED Reserved 2025-10-28 | Published 2025-11-06 | Updated 2025-11-06 | Assigner GitHub_M




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-20: Improper Input Validation

CWE-434: Unrestricted Upload of File with Dangerous Type

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 0.6.8
affected

References

github.com/...hboard/security/advisories/GHSA-jvmw-hg62-jr47

github.com/...ommit/18d2f6aded0d6424cc4c8619731dd20563f4cfd8

cve.org (CVE-2025-64176)

nvd.nist.gov (CVE-2025-64176)

Download JSON