CVE-2025-62796
Description
PrivateBin is an online pastebin where the server has zero knowledge of pasted data. Versions 1.7.7 through 2.0.1 allow persistent HTML injection via the unsanitized attachment filename (attachment_name) when attachments are enabled. An attacker can modify attachment_name before encryption so that, after decryption, arbitrary HTML is inserted unescaped into the page near the file size hint, enabling redirect (e.g., meta refresh) and site defacement and related phishing attacks. Script execution is normally blocked by the recommended Content Security Policy, limiting confidentiality impact. The issue was introduced in 1.7.7 and fixed in 2.0.2. Update to 2.0.2 or later. Workarounds include enforcing the recommended CSP, deploying PrivateBin on a separate domain, or disabling attachments.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
privatebin/privatebinPackagist | >= 1.7.7, < 2.0.2 | 2.0.2 |
Affected products
1- Range: 0.18, 0.19, 0.20, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-867c-p784-5q6gghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-62796ghsaADVISORY
- github.com/PrivateBin/PrivateBin/commit/c4f8482b3072be7ae012cace1b3f5658dcc3b42envdWEB
- github.com/PrivateBin/PrivateBin/pull/1550nvdWEB
- github.com/PrivateBin/PrivateBin/security/advisories/GHSA-867c-p784-5q6gnvdWEB
News mentions
0No linked articles in our index yet.