Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Reflected XSS via GET 'dir' parameter in File Thinghie 2.5.7 |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:leefish:file_thingie:2.5.7:*:*:*:*:*:*:* |
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Reflected XSS via GET 'dir' parameter in File Thinghie 2.5.7 |
Mon, 23 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Leefish
Leefish file Thingie |
|
| Vendors & Products |
Leefish
Leefish file Thingie |
Fri, 20 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | File Thinghie 2.5.7 is vulnerable to Cross Site Scripting (XSS). A malicious user can leverage the "dir" parameter of the GET request to invoke arbitrary javascript code. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-23T14:06:08.500Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-30578
Updated: 2026-03-23T14:05:56.491Z
Status : Analyzed
Published: 2026-03-20T18:16:13.203
Modified: 2026-04-01T19:00:07.353
Link: CVE-2026-30578
No data.
OpenCVE Enrichment
Updated: 2026-04-02T07:59:36Z