CVE-2025-62796

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-62796
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62796.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-62796
Aliases
Published
2025-10-28T20:47:50Z
Modified
2025-11-10T19:58:34.622473Z
Severity
  • 5.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N CVSS Calculator
Summary
PrivateBin persistent HTML injection in attachment filename enables redirect and defacement
Details

PrivateBin is an online pastebin where the server has zero knowledge of pasted data. Versions 1.7.7 through 2.0.1 allow persistent HTML injection via the unsanitized attachment filename (attachmentname) when attachments are enabled. An attacker can modify attachmentname before encryption so that, after decryption, arbitrary HTML is inserted unescaped into the page near the file size hint, enabling redirect (e.g., meta refresh) and site defacement and related phishing attacks. Script execution is normally blocked by the recommended Content Security Policy, limiting confidentiality impact. The issue was introduced in 1.7.7 and fixed in 2.0.2. Update to 2.0.2 or later. Workarounds include enforcing the recommended CSP, deploying PrivateBin on a separate domain, or disabling attachments.

Database specific
{
    "cwe_ids": [
        "CWE-79",
        "CWE-80"
    ]
}
References

Affected packages

Git / github.com/privatebin/privatebin

Affected ranges

Type
GIT
Repo
https://github.com/privatebin/privatebin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.18
0.19
0.20
0.21
0.21.1
0.22

1.*

1.0
1.1
1.2
1.2.1
1.3
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.4.0
1.5.0
1.5.1
1.5.2
1.6.0
1.6.1
1.6.2
1.7.0
1.7.1
1.7.2
1.7.3
1.7.4
1.7.5
1.7.6
1.7.7
1.7.8

2.*

2.0.0
2.0.1