CVE-2025-54796

Copyparty · Copyparty

A high-severity vulnerability has been identified in the Copyparty portable file server, designated CVE-2025-54796.

Executive summary

A high-severity vulnerability has been identified in the Copyparty portable file server, designated CVE-2025-54796. Successful exploitation could allow an unauthenticated remote attacker to gain unauthorized access to sensitive files on the server. This could lead to a significant data breach, exposure of confidential information, or further system compromise.

Vulnerability

The vulnerability is a path traversal flaw within the file-serving component of Copyparty. The application fails to properly sanitize user-supplied input in the URL path used to request files. A remote, unauthenticated attacker can exploit this by crafting a malicious request containing "dot-dot-slash" (../) sequences to navigate outside of the intended web root directory, allowing them to read arbitrary files on the underlying server filesystem with the permissions of the web server process.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could have a severe impact on the business, leading to the unauthorized disclosure of sensitive data, such as intellectual property, customer information, or system configuration files containing credentials. This type of data breach can result in significant financial loss, regulatory fines, reputational damage, and a loss of customer trust. If an attacker can access configuration or script files, they may be able to leverage that information to escalate privileges or achieve remote code execution, leading to a full system compromise.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately to all affected instances of Copyparty. After patching, administrators should review web server and application access logs for any signs of exploitation attempts that may have occurred prior to the update.

Proactive Monitoring: Implement enhanced monitoring on affected servers. Specifically, security teams should configure monitoring tools and review logs for suspicious URL patterns containing path traversal sequences (e.g., ../, ..%2f, ..\). Monitor for unusual access attempts to sensitive system files (e.g., /etc/passwd, /etc/shadow, C:\Windows\System32\config\SAM).

Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. Deploy a Web Application Firewall (WAF) with rules designed to detect and block path traversal attacks. Additionally, restrict the file system permissions of the service account running the Copyparty application to prevent it from accessing directories outside of its intended scope.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high-severity rating (CVSS 7.5), this vulnerability poses a significant risk to the confidentiality of data hosted on or accessible by the affected server. Although it is not currently listed on the CISA KEV list, organizations are strongly advised to treat this as a critical priority. The analyst recommends that all organizations using the affected Copyparty software apply the vendor-supplied patches immediately to prevent potential data breaches and system compromise.