CVE-2025-64711

LOW
中文标题:
(暂无数据)
英文标题:
PrivateBin vulnerable to malicious filename use for self-XSS / HTML injection locally for users
CVSS分数: 3.9
发布时间: 2025-11-13 01:50:31
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v2
漏洞描述
中文描述:

(暂无数据)

英文描述:

PrivateBin is an online pastebin where the server has zero knowledge of pasted data. Starting in version 1.7.7 and prior to version 2.0.3, dragging a file whose filename contains HTML is reflected verbatim into the page via the drag-and-drop helper, so any user who drops a crafted file on PrivateBin will execute arbitrary JavaScript within their own session (self-XSS). This allows an attacker who can entice a victim to drag or otherwise attach such a file to exfiltrate plaintext, encryption keys, or stored pastes before they are encrypted or sent. Certain conditions must exist for the vulnerability to be exploitable. Only macOS or Linux users are affected, due to the way the `>` character is treated in a file name on Windows. The PrivateBin instance needs to have file upload enabled. An attacker needs to have access to the local file system or somehow convince the user to create (or download) a malicious file (name). An attacker needs to convince the user to attach that malicious file to PrivateBin. Any Mac / Linux user who can be tricked into dragging a maliciously named file into the editor is impacted; code runs in the origin of the PrivateBin instance they are using. Attackers can steal plaintext, passphrases, or manipulate the UI before data is encrypted, defeating the zero-knowledge guarantees for that victim session, assuming counter-measures like Content-Security-Policy (CSP) have been disabled. If CSP is not disabled, HTML injection attacks may be possible - like redirecting to a foreign website, phishing etc. As the whole exploit needs to be included in the file name of the attached file and only affects the local session of the user (aka it is neither persistent nor remotely executable) and that user needs to interact and actively attach that file to the paste, the impact is considered to be practically low. Version 2.0.3 patches the issue.

CWE类型:
CWE-79
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
PrivateBin PrivateBin >= 1.7.7, < 2.0.3 - - cpe:2.3:a:privatebin:privatebin:>=_1.7.7,_<_2.0.3:*:*:*:*:*:*:*
privatebin privatebin * - - cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-r9x7-7ggj-fx9f x_refsource_CONFIRM
cve.org
访问
https://github.com/PrivateBin/PrivateBin/commit/f9550e513381208b36595ee2404e968144bba78b x_refsource_MISC
cve.org
访问
CVSS评分详情
3.1 (cna)
LOW
3.9
CVSS向量: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
机密性
LOW
完整性
LOW
可用性
NONE
时间信息
发布时间:
2025-11-13 01:50:31
修改时间:
2025-11-13 14:34:51
创建时间:
2026-01-12 02:12:20
更新时间:
2026-01-12 02:28:01
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-64711 2025-11-15 03:17:46 2026-01-12 02:12:20
NVD nvd_CVE-2025-64711 2025-11-26 03:00:12 2026-01-12 02:28:01
版本与语言
当前版本: v2
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v2 NVD
2026-01-12 02:28:01
affected_products_count: 1 → 2; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 1 -> 2
  • data_sources: ['cve'] -> ['cve', 'nvd']