Wiz Agents & Workflows are here

CVE-2025-64711
PHP vulnerability analysis and mitigation

Overview

PrivateBin, an online pastebin service, was found to be vulnerable to a self-XSS vulnerability (CVE-2025-64711) that affects versions 1.7.7 and later. The vulnerability was discovered on November 9, 2025, and publicly disclosed on November 12, 2025. The issue allows attackers to execute arbitrary JavaScript within a user's session through maliciously crafted filenames in the drag-and-drop file upload handler (GitHub Advisory, Miggo).

Technical details

The vulnerability stems from improper handling of filenames during drag-and-drop operations. When a file is dropped, the readFileData function collects filenames and calls printDragAndDropFileNames, which insecurely renders user-submitted filenames as HTML using jQuery's .html() method instead of .text(). The vulnerability has a CVSS score of 3.9 (Low) with a vector of CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N. The issue is classified as CWE-79 (Cross-site Scripting) and only affects macOS and Linux users, as Windows prevents the use of special characters in filenames that are necessary for exploitation (GitHub Advisory).

Impact

The vulnerability allows attackers to steal plaintext, passphrases, or manipulate the UI before data encryption, potentially compromising the zero-knowledge guarantees for the victim's session. However, the impact is considered practically low as it requires user interaction, only affects the local session, and most PrivateBin instances use Content-Security-Policy headers that prevent most exploitation scenarios. If CSP is disabled, attackers could potentially redirect to foreign websites or conduct phishing attacks (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in PrivateBin version 2.0.3. Users are strongly recommended to upgrade to this version. Alternative mitigations include updating the Content-Security-Policy in the configuration file to the latest recommended settings, deploying PrivateBin on a separate domain to limit the vulnerability scope, or disabling file attachments entirely. Users should verify their CSP settings independently, even after upgrading to a fixed version (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-wprj-9cvc-5w37HIGH7.5
  • PHPPHP
  • wwbn/avideo
NoNoMar 29, 2026
CVE-2026-34036MEDIUM6.5
  • PHPPHP
  • dolibarr/dolibarr
NoNoMar 31, 2026
CVE-2026-33887MEDIUM5.4
  • PHPPHP
  • statamic/cms
NoYesMar 27, 2026
CVE-2026-27599MEDIUM4.7
  • PHPPHP
  • ci4-cms-erp/ci4ms
NoYesMar 30, 2026
CVE-2026-34372MEDIUMN/A
  • PHPPHP
  • sulu/sulu
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management