Skip to main content

CVE-2025-54789: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in humhub cfiles

Medium
VulnerabilityCVE-2025-54789cvecve-2025-54789cwe-80
Published: Fri Aug 01 2025 (08/01/2025, 23:26:32 UTC)
Source: CVE Database V5
Vendor/Project: humhub
Product: cfiles

Description

Files is a module for managing files inside spaces and user profiles. In versions 0.16.9 and below, the File Move functionality does not contain logic that prevents injection of arbitrary JavaScript, which can lead to Browser JS code execution in the context of the user’s session. This is fixed in version 0.16.10.

AI-Powered Analysis

AILast updated: 08/01/2025, 23:47:41 UTC

Technical Analysis

CVE-2025-54789 is a medium-severity vulnerability affecting the 'Files' module (cfiles) of the HumHub social collaboration platform, specifically versions 0.16.9 and earlier. The vulnerability is categorized under CWE-80, which involves improper neutralization of script-related HTML tags, commonly known as a Cross-Site Scripting (XSS) flaw. The issue arises in the File Move functionality, where insufficient input validation allows an attacker to inject arbitrary JavaScript code. When a user interacts with the affected functionality, the malicious script executes within the context of their browser session, potentially leading to session hijacking, unauthorized actions, or data theft. The vulnerability does not require authentication (PR:L indicates low privileges), but does require user interaction (UI:P), such as clicking a crafted link or performing a file move operation. The CVSS 4.0 score of 5.1 reflects a medium impact, with network attack vector (AV:N), low attack complexity (AC:L), and no privileges required (PR:L). The vulnerability affects confidentiality, integrity, and availability to a limited extent, primarily through client-side script execution. The issue is fixed in version 0.16.10 of the cfiles module. No known exploits are reported in the wild as of the publication date.

Potential Impact

For European organizations using HumHub with the vulnerable cfiles module, this XSS vulnerability could lead to unauthorized execution of JavaScript in users' browsers. This may result in session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of users. Since HumHub is often used for internal collaboration and file sharing, exploitation could compromise internal communications and data confidentiality. The impact is particularly significant for organizations with sensitive or regulated data, such as financial institutions, healthcare providers, and government agencies. Additionally, the vulnerability could be leveraged as a foothold for further attacks within the network if combined with social engineering or phishing campaigns. However, the requirement for user interaction and the medium severity score suggest that the risk is moderate and can be mitigated with appropriate controls.

Mitigation Recommendations

European organizations should promptly upgrade the HumHub cfiles module to version 0.16.10 or later to remediate this vulnerability. In addition, implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Employ input validation and output encoding on all user-supplied data within the application to prevent script injection. Conduct user awareness training to recognize and avoid suspicious links or file operations that could trigger XSS attacks. Monitor web application logs for unusual activity related to file operations. If upgrading immediately is not feasible, consider disabling the File Move functionality temporarily or restricting it to trusted users only. Regularly scan the application with automated security testing tools to detect similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-29T16:50:28.393Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 688d4e9cad5a09ad00cfd476

Added to database: 8/1/2025, 11:32:44 PM

Last enriched: 8/1/2025, 11:47:41 PM

Last updated: 8/2/2025, 12:02:53 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats