CVE-2025-27145: copyparty renders unsanitized filenames as HTML when user uploads empty files
3.6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.04663%
CWE
Published
2/26/2025
Updated
2/26/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
copyparty | pip | < 1.16.15 | 1.16.15 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unescaped filename insertion in up2k.js's message construction logic. The GitHub patch shows the addition of esc() calls around bad_files[a][1] and nil_files[a][1] in up2k_init, proving these were the vulnerable points. These locations directly used user-controlled filenames in HTML context without sanitization, enabling DOM XSS when empty files with malicious names were dragged into the UI.