CVE-2025-65516: n/a
A stored cross-site scripting (XSS) vulnerability was discovered in Seafile Community Edition prior to version 13.0.12. When Seafile is configured with the Golang file server, an attacker can upload a crafted SVG file containing malicious JavaScript and share it using a public link. Opening the link triggers script execution in the victim's browser. This issue has been fixed in Seafile Community Edition 13.0.12.
AI Analysis
Technical Summary
CVE-2025-65516 is a stored cross-site scripting (XSS) vulnerability identified in Seafile Community Edition prior to version 13.0.12, specifically when the system is configured to use the Golang file server. The vulnerability arises because the application insufficiently sanitizes SVG files uploaded by users. An attacker can craft an SVG file embedding malicious JavaScript code and upload it to the Seafile server. By sharing the file via a public link, the attacker can entice victims to open the link, which triggers the execution of the embedded script in the victim's browser context. This stored XSS attack can lead to the theft of session tokens, user impersonation, or manipulation of the web interface, thereby compromising user confidentiality and integrity. The vulnerability does not affect availability and does not require any authentication to exploit, but it does require the victim to interact by clicking the malicious link. The CVSS 3.1 base score is 6.1 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity. The issue has been addressed in Seafile Community Edition 13.0.12 by properly sanitizing SVG content and preventing script execution. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of user data and sessions. Organizations using vulnerable versions of Seafile with the Golang file server and allowing public sharing of files are at risk of targeted phishing or social engineering attacks leveraging malicious SVG files. Successful exploitation could lead to session hijacking, unauthorized actions on behalf of users, or disclosure of sensitive information accessible via the victim's browser session. While availability is not directly impacted, the reputational damage and potential data leakage could be significant, especially for organizations handling sensitive or regulated data under GDPR. The requirement for user interaction limits mass exploitation but targeted attacks against employees or partners remain feasible. The vulnerability could be exploited in environments where SVG files are commonly shared or where users are less cautious about opening public links. European organizations with collaborative workflows involving Seafile should consider this a priority vulnerability to patch to maintain compliance and security posture.
Mitigation Recommendations
1. Immediately upgrade Seafile Community Edition to version 13.0.12 or later, which contains the fix for this vulnerability. 2. Until patching is complete, restrict or disable public sharing of SVG files via the Golang file server to prevent malicious uploads. 3. Implement content filtering or scanning on uploaded SVG files to detect and block files containing embedded scripts or suspicious elements. 4. Educate users about the risks of opening public links, especially those containing SVG files, and encourage verification of link sources. 5. Monitor web server and application logs for unusual file uploads or access patterns indicative of exploitation attempts. 6. Employ Content Security Policy (CSP) headers to restrict script execution from untrusted sources, mitigating impact if exploitation occurs. 7. Review and harden browser security settings and consider browser extensions that block or warn about suspicious scripts in SVG files. 8. Conduct regular security assessments and penetration testing focused on file upload and sharing functionalities to detect similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2025-65516: n/a
Description
A stored cross-site scripting (XSS) vulnerability was discovered in Seafile Community Edition prior to version 13.0.12. When Seafile is configured with the Golang file server, an attacker can upload a crafted SVG file containing malicious JavaScript and share it using a public link. Opening the link triggers script execution in the victim's browser. This issue has been fixed in Seafile Community Edition 13.0.12.
AI-Powered Analysis
Technical Analysis
CVE-2025-65516 is a stored cross-site scripting (XSS) vulnerability identified in Seafile Community Edition prior to version 13.0.12, specifically when the system is configured to use the Golang file server. The vulnerability arises because the application insufficiently sanitizes SVG files uploaded by users. An attacker can craft an SVG file embedding malicious JavaScript code and upload it to the Seafile server. By sharing the file via a public link, the attacker can entice victims to open the link, which triggers the execution of the embedded script in the victim's browser context. This stored XSS attack can lead to the theft of session tokens, user impersonation, or manipulation of the web interface, thereby compromising user confidentiality and integrity. The vulnerability does not affect availability and does not require any authentication to exploit, but it does require the victim to interact by clicking the malicious link. The CVSS 3.1 base score is 6.1 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity. The issue has been addressed in Seafile Community Edition 13.0.12 by properly sanitizing SVG content and preventing script execution. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of user data and sessions. Organizations using vulnerable versions of Seafile with the Golang file server and allowing public sharing of files are at risk of targeted phishing or social engineering attacks leveraging malicious SVG files. Successful exploitation could lead to session hijacking, unauthorized actions on behalf of users, or disclosure of sensitive information accessible via the victim's browser session. While availability is not directly impacted, the reputational damage and potential data leakage could be significant, especially for organizations handling sensitive or regulated data under GDPR. The requirement for user interaction limits mass exploitation but targeted attacks against employees or partners remain feasible. The vulnerability could be exploited in environments where SVG files are commonly shared or where users are less cautious about opening public links. European organizations with collaborative workflows involving Seafile should consider this a priority vulnerability to patch to maintain compliance and security posture.
Mitigation Recommendations
1. Immediately upgrade Seafile Community Edition to version 13.0.12 or later, which contains the fix for this vulnerability. 2. Until patching is complete, restrict or disable public sharing of SVG files via the Golang file server to prevent malicious uploads. 3. Implement content filtering or scanning on uploaded SVG files to detect and block files containing embedded scripts or suspicious elements. 4. Educate users about the risks of opening public links, especially those containing SVG files, and encourage verification of link sources. 5. Monitor web server and application logs for unusual file uploads or access patterns indicative of exploitation attempts. 6. Employ Content Security Policy (CSP) headers to restrict script execution from untrusted sources, mitigating impact if exploitation occurs. 7. Review and harden browser security settings and consider browser extensions that block or warn about suspicious scripts in SVG files. 8. Conduct regular security assessments and penetration testing focused on file upload and sharing functionalities to detect similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6931b411739651d5d52cf9e2
Added to database: 12/4/2025, 4:17:21 PM
Last enriched: 12/11/2025, 10:05:00 PM
Last updated: 1/18/2026, 11:37:59 AM
Views: 119
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1118: SQL Injection in itsourcecode Society Management System
MediumCVE-2025-15537: Heap-based Buffer Overflow in Mapnik
MediumCVE-2025-15536: Heap-based Buffer Overflow in BYVoid OpenCC
MediumWireshark 4.6.3 Released, (Sat, Jan 17th)
Medium"How many states are there in the United States?", (Sun, Jan 18th)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.