Description
In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins are urged to upgrade to these versions to protect the affected users.
References (4)
Core 4
Core References
Exploit, Third Party Advisory x_refsource_confirm
https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738
Release Notes, Vendor Advisory x_refsource_misc
https://privatebin.info/news/v1.3.2-v1.2.2-release.html
Patch x_refsource_misc
https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6
Third Party Advisory x_refsource_misc
https://github.com/PrivateBin/PrivateBin/issues/554
Scores
CVSS v3
6.1
EPSS
0.0045
EPSS Percentile
63.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (2)
privatebin/privatebin
0 - 1.2.2Packagist
privatebin/privatebin
1.2 - 1.2.2
Published
Jan 23, 2020
Tracked Since
Feb 18, 2026