Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users. This is fixed in version 1.18.7.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Jul 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
9001
9001 copyparty |
|
Vendors & Products |
9001
9001 copyparty |
Thu, 31 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 31 Jul 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users. This is fixed in version 1.18.7. | |
Title | copyparty Reflected XSS via Filter Parameter | |
Weaknesses | CWE-79 CWE-80 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-31T13:48:41.615Z
Updated: 2025-07-31T14:12:45.463Z
Reserved: 2025-07-25T16:19:16.094Z
Link: CVE-2025-54589

Updated: 2025-07-31T14:01:17.804Z

Status : Awaiting Analysis
Published: 2025-07-31T14:15:34.927
Modified: 2025-07-31T18:42:37.870
Link: CVE-2025-54589

No data.