Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.4
Copyparty File Server Allows Malicious File Uploads
CVE-2026-32109
GHSA-rcp6-88mm-9vgf
Summary
A security issue in older versions of the Copyparty portable file server allows an attacker with read and write access to the server to upload a malicious file. If a victim clicks a specially crafted link to this file, it could potentially execute code in the victim's browser. To protect yourself, update to version 1.20.12 or higher.
What to do
- Update copyparty to version 1.20.12.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | copyparty | <= 1.20.12 | 1.20.12 |
| 9001 | copyparty | <= 1.20.12 | – |
Original title
Copyparty is a portable file server. Prior to 1.20.12, if an attacker has been given both read- and write-permissions to the server, they can upload a malicious file with the filename .prologue.htm...
Original description
Copyparty is a portable file server. Prior to 1.20.12, if an attacker has been given both read- and write-permissions to the server, they can upload a malicious file with the filename .prologue.html and then craft a link to potentially execute arbitrary JavaScript in the victim's context. Note that it is intended behavior that the JavaScript would execute if the target clicks a link to the HTML file itself; "https://example.com/foo/.prologue.html". The vulnerability is that "https://example.com/foo/?b" would also evaluate the file, making the behavior unexpected. There are existing preventative measures (strict SameSite cookies) which makes it harder to leverage this vulnerability in an attack; in order to gain control of the target's authenticated session, the link must be clicked from a page served by the server itself -- most likely by editing an existing resource, which would require additional access permissions. Finally, for this attack to be successful, the attacker's target must click the specific crafted link given by the attacker. This vulnerability is not activated by normally browsing the web-UI on the server. This vulnerability is fixed in 1.20.12.
nvd CVSS3.1
3.7
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 11 Mar 2026 · Updated: 13 Mar 2026 · First seen: 11 Mar 2026