Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Copyparty 1.18.6 - Reflected Cross-Site Scripting (XSS)

0
Medium
Published: Sun Aug 03 2025 (08/03/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Copyparty 1.18.6 - Reflected Cross-Site Scripting (XSS)

AI-Powered Analysis

AILast updated: 10/27/2025, 01:41:04 UTC

Technical Analysis

The security threat involves a reflected Cross-Site Scripting (XSS) vulnerability in Copyparty version 1.18.6, a web-based file-sharing server. Reflected XSS occurs when untrusted user input is immediately echoed by the web application without proper sanitization or encoding, allowing attackers to inject malicious JavaScript code. When a victim clicks a crafted URL or visits a manipulated page, the malicious script executes in their browser context, potentially stealing cookies, session tokens, or performing actions on behalf of the user. The exploit code for this vulnerability is publicly available and implemented in the C programming language, indicating that the vulnerability can be reliably triggered. Although no known exploits in the wild have been reported, the presence of exploit code increases the risk of future attacks. Copyparty’s web interface is the attack surface, and since it is often used for file sharing, attackers could leverage this vulnerability to compromise user sessions or spread malware. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps. The vulnerability’s medium severity rating reflects the typical impact of reflected XSS, which requires user interaction and generally does not allow direct system compromise but can lead to significant data exposure or user impersonation.

Potential Impact

For European organizations, the reflected XSS vulnerability in Copyparty 1.18.6 could lead to unauthorized access to user sessions, theft of sensitive information such as authentication tokens, and potential spread of malware through malicious scripts. Organizations using Copyparty for internal or external file sharing risk exposing their users to phishing or session hijacking attacks. This could result in data breaches, loss of user trust, and compliance violations under regulations like GDPR. Public-facing Copyparty instances are particularly at risk, as attackers can lure users into clicking malicious links. The impact on confidentiality and integrity is significant, though availability is less likely to be affected. The presence of exploit code increases the likelihood of targeted attacks, especially against organizations with lax input validation or insufficient web security controls.

Mitigation Recommendations

European organizations should immediately audit their Copyparty deployments to identify affected versions. Until an official patch is released, implement strict input validation and output encoding on all user-supplied data in the web interface to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Educate users about the risks of clicking suspicious links related to file-sharing services. Monitor web server logs for unusual requests that may indicate exploitation attempts. Consider isolating or restricting access to Copyparty instances to trusted networks only. Stay informed about updates from Copyparty developers and apply patches promptly once available. Additionally, use web application firewalls (WAFs) configured to detect and block XSS payloads targeting Copyparty endpoints.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52390
Has Exploit Code
true
Code Language
c

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Copyparty 1.18.6 - Reflected Cross-Site Scripting (XSS)

/*
 * Author       : Byte Reaper
 * CVE          : CVE-2025-54589
 * Title : Copyparty 1.18.6 - Reflected Cross-Site Scripting (XSS)
 * CVE-2025-54589 is a reflected cross-site scripting (XSS) vulnerability in Copyparty (≤ 1.18.6) where the filter parameter is inserted into the HTML response without proper sanitization,
  allowing an attacker to inject and execute arbitrary JavaScript in a victim’s browser
*/

#include <curl/urlapi.h>
#include <netinet/in.h>
#include <stdio.h>
#include <string.h
... (12479 more characters)
Code Length: 12,979 characters • Language: C/C++

Threat ID: 68900844ad5a09ad00dd9e01

Added to database: 8/4/2025, 1:09:24 AM

Last enriched: 10/27/2025, 1:41:04 AM

Last updated: 11/19/2025, 9:02:26 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats