{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-54796","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-07-29T16:50:28.395Z","datePublished":"2025-08-01T23:38:27.221Z","dateUpdated":"2025-08-04T15:19:59.399Z"},"containers":{"cna":{"title":"Copyparty is vulnerable to Regex Denial of Service (ReDoS) attacks through \"Recent Uploads\" page","problemTypes":[{"descriptions":[{"cweId":"CWE-400","lang":"en","description":"CWE-400: Uncontrolled Resource Consumption","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-1333","lang":"en","description":"CWE-1333: Inefficient Regular Expression Complexity","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-833","lang":"en","description":"CWE-833: Deadlock","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/9001/copyparty/security/advisories/GHSA-5662-2rj7-f2v6","tags":["x_refsource_CONFIRM"],"url":"https://github.com/9001/copyparty/security/advisories/GHSA-5662-2rj7-f2v6"},{"name":"https://github.com/9001/copyparty/commit/09910ba80784c3980947d92f45db696398c0fd83","tags":["x_refsource_MISC"],"url":"https://github.com/9001/copyparty/commit/09910ba80784c3980947d92f45db696398c0fd83"},{"name":"https://github.com/9001/copyparty/releases/tag/v1.18.9","tags":["x_refsource_MISC"],"url":"https://github.com/9001/copyparty/releases/tag/v1.18.9"}],"affected":[{"vendor":"9001","product":"copyparty","versions":[{"version":"< 1.18.9","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-08-01T23:38:27.221Z"},"descriptions":[{"lang":"en","value":"Copyparty is a portable file server. Versions prior to 1.18.9, the filter parameter for the \"Recent Uploads\" page allows arbitrary RegExes. If this feature is enabled (which is the default), an attacker can craft a filter which deadlocks the server. This is fixed in version 1.18.9."}],"source":{"advisory":"GHSA-5662-2rj7-f2v6","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/9001/copyparty/security/advisories/GHSA-5662-2rj7-f2v6","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-04T15:19:56.634822Z","id":"CVE-2025-54796","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-04T15:19:59.399Z"}}]}}