A stored Cross-Site Scripting (XSS) vulnerability has been found in Seafile v12.0.10. This vulnerability allows an attacker to execute arbitrary code in the victim's browser by storing malicious payloads with POST parámetro 'p' in '/api/v2.1/repos/{repo_id}/file/'.
References
| Link | Resource |
|---|---|
| https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-seafile | Third Party Advisory |
Configurations
History
05 Dec 2025, 23:47
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Seafile
Seafile seafile |
|
| CPE | cpe:2.3:a:seafile:seafile:*:*:*:*:*:*:*:* | |
| References | () https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-seafile - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
04 Dec 2025, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-04 12:16
Updated : 2025-12-05 23:47
NVD link : CVE-2025-41080
Mitre link : CVE-2025-41080
CVE.ORG link : CVE-2025-41080
JSON object : View
Products Affected
seafile
- seafile
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
