An XSS allows for reflected cross-site scripting via URL-parameter ?setck=...
A reflected cross-site scripting (XSS) vulnerability could allow an attacker to execute malicious javascript by tricking users into accessing a malicious link.
The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link.
All attempted attacks (successful or not) would be logged to both the copyparty serverlog and the accesslog of the reverseproxy, and are detected by grep -E '[?&]setck=[^&"]*%' (the text setck= eventually followed by the % character).
{
"nvd_published_at": "2026-02-26T02:16:22Z",
"github_reviewed_at": "2026-02-26T22:33:46Z",
"github_reviewed": true,
"severity": "MODERATE",
"cwe_ids": [
"CWE-79"
]
}