Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23272 | copyparty Reflected XSS via Filter Parameter |
Github GHSA |
GHSA-8mx2-rjh8-q3jq | copyparty Reflected XSS via Filter Parameter |
Mon, 22 Sep 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:9001:copyparty:*:*:*:*:*:*:*:* |
Thu, 31 Jul 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
9001
9001 copyparty |
|
| Vendors & Products |
9001
9001 copyparty |
Thu, 31 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 31 Jul 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users. This is fixed in version 1.18.7. | |
| Title | copyparty Reflected XSS via Filter Parameter | |
| Weaknesses | CWE-79 CWE-80 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-31T14:12:45.463Z
Reserved: 2025-07-25T16:19:16.094Z
Link: CVE-2025-54589
Updated: 2025-07-31T14:01:17.804Z
Status : Analyzed
Published: 2025-07-31T14:15:34.927
Modified: 2025-09-22T14:38:17.617
Link: CVE-2025-54589
No data.
OpenCVE Enrichment
Updated: 2025-07-31T19:36:25Z
EUVD
Github GHSA