{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-54789","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-07-29T16:50:28.393Z","datePublished":"2025-08-01T23:26:32.195Z","dateUpdated":"2025-08-04T15:40:11.383Z"},"containers":{"cna":{"title":"Files is Vulnerable to Reflected Self-XSS through its File Move Functionality","problemTypes":[{"descriptions":[{"cweId":"CWE-80","lang":"en","description":"CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/humhub/cfiles/security/advisories/GHSA-cw2v-c62w-5r43","tags":["x_refsource_CONFIRM"],"url":"https://github.com/humhub/cfiles/security/advisories/GHSA-cw2v-c62w-5r43"},{"name":"https://github.com/humhub/cfiles/commit/f022bdd1cc54334a7a2a6f90a8168bb9583a2f00","tags":["x_refsource_MISC"],"url":"https://github.com/humhub/cfiles/commit/f022bdd1cc54334a7a2a6f90a8168bb9583a2f00"},{"name":"https://github.com/humhub/cfiles/releases/tag/v0.16.10","tags":["x_refsource_MISC"],"url":"https://github.com/humhub/cfiles/releases/tag/v0.16.10"}],"affected":[{"vendor":"humhub","product":"cfiles","versions":[{"version":"< 0.6.10","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-08-01T23:26:32.195Z"},"descriptions":[{"lang":"en","value":"Files is a module for managing files inside spaces and user profiles. In versions 0.16.9 and below, the File Move functionality does not contain logic that prevents injection of arbitrary JavaScript, which can lead to Browser JS code execution in the context of the user’s session. This is fixed in version 0.16.10."}],"source":{"advisory":"GHSA-cw2v-c62w-5r43","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-04T15:40:03.523315Z","id":"CVE-2025-54789","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-04T15:40:11.383Z"}}]}}