Vulnerability DatabaseGHSA-cw7j-v52w-fp5r

GHSA-cw7j-v52w-fp5r
Python vulnerability analysis and mitigation

Overview

A reflected cross-site scripting (XSS) vulnerability was discovered in copyparty's web interface through the URL parameter '?hc='. The vulnerability was identified and tracked as GHSA-cw7j-v52w-fp5r, affecting versions below 1.8.6. The issue was disclosed and patched on July 21, 2023, with a CVSS score of 6.3 (Moderate severity) (GitHub Advisory).

Technical details

The vulnerability exists in the web interface where user input from the '?hc=' URL parameter was not properly sanitized, allowing for reflected XSS attacks. The vulnerability has been assigned a CVSS v3.1 base score of 6.3 with the following metrics: Network attack vector, Low attack complexity, No privileges required, User interaction Required, Unchanged scope, and Low impact on Confidentiality, Integrity, and Availability. The vulnerability is classified as CWE-79 (GitHub Advisory).

Impact

If successfully exploited, the vulnerability could allow attackers to execute malicious JavaScript code in the context of the victim's browser session. The worst-case scenario includes the ability to move or delete existing files on the server, or upload new files, using the compromised user's account (Security Advisory).

Mitigation and workarounds

The vulnerability was patched in version 1.8.6. Users are recommended to upgrade to this version or later. For those using a reverse proxy, logs can be checked for potential exploitation by searching for URLs containing '?hc=' with '<' in its value using the command: '(gzip -dc access.log.gz; cat access.log) | sed -r 's/" [0-9]+ .*//' | grep -E '?&=.[<>]'. It is also recommended to change copyparty account passwords unless logs have been inspected and confirmed clean (Release Notes).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65896CRITICAL9.8
  • PythonPython
  • asyncmy
NoNoDec 02, 2025
CVE-2025-66423HIGH7.1
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-66454MEDIUM6.5
  • PythonPython
  • arcade-mcp-server
NoYesDec 02, 2025
CVE-2025-66424MEDIUM6.5
  • PythonPython
  • trytond
NoYesNov 30, 2025
CVE-2025-65858LOW3.5
  • PythonPython
  • calibreweb
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management