Vulnerability Description
Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users. This is fixed in version 1.18.7.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| 9001 | Copyparty | < 1.18.7 |
Related Weaknesses (CWE)
References
- https://github.com/9001/copyparty/commit/a8705e611d05eeb22be5d3d7d9ab5c020fe54c6Patch
- https://github.com/9001/copyparty/releases/tag/v1.18.7Release Notes
- https://github.com/9001/copyparty/security/advisories/GHSA-8mx2-rjh8-q3jqExploitVendor Advisory
FAQ
What is CVE-2025-54589?
CVE-2025-54589 is a vulnerability with a CVSS score of 6.3 (MEDIUM). Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a ...
How severe is CVE-2025-54589?
CVE-2025-54589 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-54589?
Check the references section above for vendor advisories and patch information. Affected products include: 9001 Copyparty.