CVE-2025-64176

Source
https://cve.org/CVERecord?id=CVE-2025-64176
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64176.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-64176
Aliases
  • GHSA-jvmw-hg62-jr47
Published
2025-11-06T21:12:38.265Z
Modified
2026-04-02T12:59:10.818095Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
ThinkDashboard: Arbitrary File Upload vulnerability in the Backup Import Feature
Details

ThinkDashboard is a self-hosted bookmark dashboard built with Go and vanilla JavaScript. In versions 0.6.7 and below, an attacker can upload any file they wish to the /data directory of the web application via the backup import feature. When importing a backup, an attacker can first choose a .zip file to bypass the client-side file-type verification. This could lead to stored XSS, or be used for other nefarious purposes such as malware distribution. This issue is fixed in version 0.6.8.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64176.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-20",
        "CWE-434",
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/matiasdesuu/thinkdashboard

Affected ranges

Type
GIT
Repo
https://github.com/matiasdesuu/thinkdashboard
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.2
0.2.1
0.3
0.3.1
0.4
0.4.5
0.5
0.5.5
0.6
0.6.5
0.6.6
0.6.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64176.json"