Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30587: n/a

0
Unknown
VulnerabilityCVE-2026-30587cvecve-2026-30587
Published: Wed Mar 25 2026 (03/25/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Multiple Stored XSS vulnerabilities exist in Seafile Server version 13.0.15,13.0.16-pro,12.0.14 and prior and fixed in 13.0.17, 13.0.17-pro, and 12.0.20-pro, via the Seadoc (sdoc) editor. The application fails to properly sanitize WebSocket messages regarding document structure updates. This allows authenticated remote attackers to inject malicious JavaScript payloads via the src attribute of embedded Excalidraw whiteboards or the href attribute of anchor tags

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 18:02:10 UTC

Technical Analysis

CVE-2026-30587 identifies multiple stored Cross-Site Scripting (XSS) vulnerabilities in Seafile Server, specifically versions 13.0.15, 13.0.16-pro, 12.0.14, and prior. The root cause lies in the Seadoc (sdoc) editor's failure to properly sanitize WebSocket messages that update document structures. These messages can contain malicious JavaScript payloads embedded via the src attribute of Excalidraw whiteboards or the href attribute of anchor tags. Because these payloads are stored within the document, any user who accesses the infected document will have the malicious script executed in their browser context. This can lead to session hijacking, unauthorized actions, or data theft within the Seafile environment. Exploitation requires the attacker to be authenticated, which limits exposure but still poses a risk in environments with many users or where user credentials may be compromised. The vulnerability was addressed in Seafile Server versions 13.0.17, 13.0.17-pro, and 12.0.20-pro by implementing proper sanitization of WebSocket messages and input validation. No public exploits have been reported to date, but the stored nature of the XSS makes it a persistent threat once injected.

Potential Impact

The primary impact of CVE-2026-30587 is the potential for authenticated attackers to execute arbitrary JavaScript in the browsers of other users accessing compromised documents. This can lead to session hijacking, unauthorized access to sensitive data, manipulation of document contents, and potentially lateral movement within the affected organization’s Seafile environment. Confidentiality is at risk as attackers may steal session tokens or sensitive information displayed in the user interface. Integrity can be compromised through unauthorized document modifications or malicious actions performed on behalf of other users. Availability impact is generally low but could be affected if attackers use the vulnerability to disrupt normal operations or inject disruptive scripts. Organizations using vulnerable Seafile versions, especially those with many users collaborating on documents, face increased risk of internal attacks or exploitation following credential compromise. The requirement for authentication reduces the attack surface but does not eliminate risk, particularly in large or less controlled user environments.

Mitigation Recommendations

Organizations should immediately upgrade Seafile Server to versions 13.0.17, 13.0.17-pro, or 12.0.20-pro or later, where the vulnerability is fixed. Until upgrades are applied, administrators should restrict access to the Seadoc editor to trusted users only and monitor document changes for suspicious embedded content, especially Excalidraw whiteboards and anchor tags with unusual src or href attributes. Implement strict access controls and enforce strong authentication mechanisms to reduce the risk of attacker access. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious WebSocket payloads targeting document structure updates. Educate users about the risks of executing unexpected scripts and encourage reporting of unusual document behavior. Regularly audit and sanitize existing documents to remove potentially malicious embedded content. Finally, maintain vigilant monitoring of logs and user activity to detect early signs of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-04T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c41f52f4197a8e3b733a29

Added to database: 3/25/2026, 5:45:54 PM

Last enriched: 3/25/2026, 6:02:10 PM

Last updated: 3/26/2026, 6:42:58 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses