A stored Cross-Site Scripting (XSS) vulnerability has been found in Seafile v12.0.10. This vulnerability allows an attacker to execute arbitrary code in the victim's browser by storing malicious payloads with PUT parámetro 'name' in '/api/v2.1/user/'.
References
| Link | Resource |
|---|---|
| https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-seafile | Third Party Advisory |
Configurations
History
05 Dec 2025, 23:48
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:seafile:seafile:*:*:*:*:*:*:*:* | |
| References | () https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-seafile - Third Party Advisory | |
| First Time |
Seafile
Seafile seafile |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
04 Dec 2025, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-04 12:16
Updated : 2025-12-05 23:48
NVD link : CVE-2025-41079
Mitre link : CVE-2025-41079
CVE.ORG link : CVE-2025-41079
JSON object : View
Products Affected
seafile
- seafile
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
