CVE-2026-25154

Source
https://cve.org/CVERecord?id=CVE-2026-25154
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25154.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25154
Aliases
  • GHSA-34v6-52hh-x4r4
Published
2026-01-30T21:59:30.234Z
Modified
2026-02-05T20:47:48.287423Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
LocalSend has Stored XSS in Web Share Interface via Filename
Details

LocalSend is a free, open-source app that allows users to share files and messages with nearby devices over their local network without needing an internet connection. In versions up to and including 1.17.0, when a user initiates a "Share via Link" session, the LocalSend application starts a local HTTP server to host the selected files. The client-side logic for this web interface is contained in app/assets/web/main.js. Note that at [0], the handleFilesDisplay function constructs the HTML for the file list by iterating over the files received from the server. Commit 8f3cec85aa29b2b13fed9b2f8e499e1ac9b0504c contains a patch.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25154.json"
}
References

Affected packages

Git / github.com/localsend/localsend

Affected ranges

Type
GIT
Repo
https://github.com/localsend/localsend
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.10.0
v1.11.0
v1.11.1
v1.12.0
v1.13.0
v1.13.0-fdroid
v1.13.1
v1.14.0
v1.15.0
v1.15.1
v1.15.2
v1.15.3
v1.15.4
v1.16.0
v1.16.1
v1.17.0
v1.3.1
v1.5.0
v1.5.2
v1.6.1
v1.6.2
v1.8.0
v1.9.0
v1.9.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25154.json"