Skip to main content

CVE-2025-45091: n/a

Medium
VulnerabilityCVE-2025-45091cvecve-2025-45091
Published: Mon Sep 15 2025 (09/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Seafile versions 11.0.18-Pro, 12.0.10, and 12.0.10-Pro are vulnerable to a stored Cross-Site Scripting (XSS) attack. An authenticated attacker can exploit this vulnerability by modifying their username to include a malicious XSS payload in notification and activities.

AI-Powered Analysis

AILast updated: 09/15/2025, 20:00:20 UTC

Technical Analysis

CVE-2025-45091 is a stored Cross-Site Scripting (XSS) vulnerability affecting specific versions of Seafile, namely 11.0.18-Pro, 12.0.10, and 12.0.10-Pro. Seafile is a popular open-source file hosting and collaboration platform used by organizations for secure file sharing and synchronization. The vulnerability arises because an authenticated attacker can modify their username to include malicious JavaScript payloads. These payloads are then stored and rendered in notification and activity feeds, which are viewed by other users. This stored XSS attack vector allows the attacker to execute arbitrary scripts in the context of other users’ browsers when they view affected notifications or activity logs. Such scripts can steal session cookies, perform actions on behalf of the victim, or redirect users to malicious sites. The attack requires the attacker to be authenticated, which limits exploitation to users with some level of access to the system. However, once exploited, the impact can extend beyond the attacker’s own account to other users who view the injected content. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. No official patches or mitigation links have been provided, indicating that organizations using these versions should proactively address this issue.

Potential Impact

For European organizations using Seafile versions 11.0.18-Pro, 12.0.10, or 12.0.10-Pro, this vulnerability poses a significant risk to confidentiality and integrity of user sessions and data. The stored XSS can lead to session hijacking, unauthorized actions, or phishing attacks within the trusted collaboration environment. This can result in data leakage, unauthorized data modification, or disruption of business workflows. Since Seafile is often used in enterprise and government sectors for secure file sharing, exploitation could undermine trust in internal communications and data integrity. The requirement for attacker authentication limits the attack surface but does not eliminate risk, especially in environments with many users or less stringent access controls. The vulnerability could also be leveraged as a foothold for further attacks within the network. Given the collaborative nature of Seafile, the impact could cascade if multiple users are affected. The lack of known exploits suggests this is a newly disclosed vulnerability, so proactive mitigation is critical to prevent future exploitation.

Mitigation Recommendations

European organizations should immediately audit their Seafile deployments to identify if affected versions are in use. If so, they should consider the following specific mitigations: 1) Restrict user input sanitization by implementing or enhancing server-side validation and escaping of usernames and other user-generated content to prevent script injection. 2) Limit the ability of users to change usernames or enforce strict character whitelisting to exclude scriptable characters. 3) Monitor notification and activity feeds for suspicious or anomalous content that could indicate attempted exploitation. 4) Apply any vendor-provided patches or updates as soon as they become available. 5) Implement Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. 6) Educate users to recognize suspicious notifications or activities and report anomalies. 7) Consider isolating or restricting access to the notification and activity features if feasible until a patch is applied. These measures go beyond generic advice by focusing on input validation, monitoring, and user behavior controls specific to the vulnerability vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c8703cade7e5f13766e920

Added to database: 9/15/2025, 7:59:56 PM

Last enriched: 9/15/2025, 8:00:20 PM

Last updated: 9/19/2025, 7:22:12 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats