CVE-2025-58753
📋 TL;DR
Copyparty versions before 1.19.8 have an authorization bypass vulnerability in the shares feature. When a share is created for a single file within a folder, attackers can access other files in that same folder by guessing filenames. This affects all users running vulnerable Copyparty instances with the shares feature enabled.
💻 Affected Systems
- Copyparty
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Sensitive files in the same directory as a shared file could be exposed, potentially leading to data breach or unauthorized access to confidential information.
Likely Case
Unauthorized access to non-shared files in directories containing shared files, compromising data confidentiality.
If Mitigated
Limited exposure of only sibling files (not subdirectories), with no access to filekeys or dirkeys protected content.
🎯 Exploit Status
Exploitation requires guessing filenames in the same directory as a shared file, but cannot access subdirectories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.19.8
Vendor Advisory: https://github.com/9001/copyparty/security/advisories/GHSA-pxvw-4w88-6x95
Restart Required: Yes
Instructions:
1. Download Copyparty v1.19.8 or newer from GitHub releases. 2. Replace existing Copyparty files with the updated version. 3. Restart the Copyparty service.
🔧 Temporary Workarounds
Disable shares feature
allTemporarily disable the vulnerable 'shr' global option until patching is possible.
Remove or comment out any '--shr' options from Copyparty startup commands
Isolate shared files
allPlace files to be shared in separate directories with no other files present.
mkdir isolated_share && mv file_to_share.txt isolated_share/
🧯 If You Can't Patch
- Disable the shares feature entirely by removing '--shr' options from configuration
- Implement network-level access controls to limit who can access the Copyparty instance
🔍 How to Verify
Check if Vulnerable:
Check if Copyparty version is below 1.19.8 and if the '--shr' option is used in configuration.
Check Version:
python3 -c "import copyparty; print(copyparty.__version__)" or check startup logs
Verify Fix Applied:
Verify Copyparty version is 1.19.8 or higher and test that shared files in directories with other files cannot be accessed via filename guessing.
📡 Detection & Monitoring
Log Indicators:
- Multiple 200/206 responses for files in same directory as shared files
- Access patterns showing enumeration of sibling files
Network Indicators:
- HTTP requests to files in directories containing shared files without proper authorization
SIEM Query:
source="copyparty.log" AND (status=200 OR status=206) AND uri CONTAINS "/" AND NOT uri CONTAINS shared_filename