Skip to main content

CVE-2025-54423: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 9001 copyparty

Medium
VulnerabilityCVE-2025-54423cvecve-2025-54423cwe-79
Published: Mon Jul 28 2025 (07/28/2025, 19:53:24 UTC)
Source: CVE Database V5
Vendor/Project: 9001
Product: copyparty

Description

copyparty is a portable file server. In versions up to and including versions 1.18.4, an unauthenticated attacker is able to execute arbitrary JavaScript code in a victim's browser due to improper sanitization of multimedia tags in music files, including m3u files. This is fixed in version 1.18.5.

AI-Powered Analysis

AILast updated: 07/28/2025, 20:17:43 UTC

Technical Analysis

CVE-2025-54423 is a medium-severity cross-site scripting (XSS) vulnerability affecting copyparty, a portable file server software developed by 9001. The vulnerability exists in versions up to and including 1.18.4. It arises from improper sanitization of multimedia tags embedded within music files, including m3u playlist files. An unauthenticated attacker can exploit this flaw by crafting malicious multimedia files containing JavaScript code. When a victim accesses these files through the vulnerable copyparty server, the embedded script executes in the victim's browser context. This can lead to unauthorized actions such as session hijacking, defacement, or redirection to malicious sites. The vulnerability does not require authentication but does require user interaction, specifically the victim viewing or interacting with the malicious multimedia content served by copyparty. The issue is fixed in version 1.18.5. The CVSS v3.1 base score is 5.4, reflecting a network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited confidentiality and integrity impact without availability impact. No known exploits in the wild have been reported as of the publication date.

Potential Impact

For European organizations using copyparty versions prior to 1.18.5, this vulnerability poses a risk of client-side code execution in users' browsers. This can lead to theft of session tokens, unauthorized access to user accounts, or manipulation of user interactions with the file server. Organizations relying on copyparty for file sharing or internal distribution of multimedia content could see compromised user trust and potential data leakage. Although the vulnerability does not directly compromise server integrity or availability, the indirect effects of XSS attacks—such as phishing or malware delivery—could disrupt business operations and lead to reputational damage. Given copyparty's use case as a portable file server, environments with less stringent endpoint security or where users frequently access multimedia files from untrusted sources are at higher risk. The lack of authentication requirement for exploitation increases the threat surface, especially in public or semi-public deployments. However, the requirement for user interaction somewhat limits automated mass exploitation.

Mitigation Recommendations

European organizations should immediately upgrade copyparty installations to version 1.18.5 or later to remediate this vulnerability. Until patching is complete, organizations should implement strict file upload and content validation policies to prevent malicious multimedia files from being uploaded or shared. Deploying web application firewalls (WAFs) with custom rules to detect and block suspicious multimedia tags or script injections can provide temporary protection. Educating users about the risks of interacting with untrusted multimedia files served by copyparty is critical. Additionally, organizations should monitor server logs for unusual file uploads or access patterns indicative of exploitation attempts. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts in browsers. Finally, restricting copyparty access to trusted networks or VPNs can reduce exposure to unauthenticated attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-21T23:18:10.281Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6887d760ad5a09ad0086e271

Added to database: 7/28/2025, 8:02:40 PM

Last enriched: 7/28/2025, 8:17:43 PM

Last updated: 7/29/2025, 12:34:53 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats