CVE-2025-58753

7.5 HIGH

📋 TL;DR

Copyparty versions before 1.19.8 have an authorization bypass vulnerability in the shares feature. When a share is created for a single file within a folder, attackers can access other files in that same folder by guessing filenames. This affects all users running vulnerable Copyparty instances with the shares feature enabled.

💻 Affected Systems

Products:
  • Copyparty
Versions: All versions prior to 1.19.8
Operating Systems: All platforms running Copyparty
Default Config Vulnerable: ✅ No
Notes: Only affects instances using the 'shr' global option (shares feature). Filekeys and dirkeys are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive files in the same directory as a shared file could be exposed, potentially leading to data breach or unauthorized access to confidential information.

🟠

Likely Case

Unauthorized access to non-shared files in directories containing shared files, compromising data confidentiality.

🟢

If Mitigated

Limited exposure of only sibling files (not subdirectories), with no access to filekeys or dirkeys protected content.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly exposed to attackers who can guess filenames.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to access unauthorized files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires guessing filenames in the same directory as a shared file, but cannot access subdirectories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.19.8

Vendor Advisory: https://github.com/9001/copyparty/security/advisories/GHSA-pxvw-4w88-6x95

Restart Required: Yes

Instructions:

1. Download Copyparty v1.19.8 or newer from GitHub releases. 2. Replace existing Copyparty files with the updated version. 3. Restart the Copyparty service.

🔧 Temporary Workarounds

Disable shares feature

all

Temporarily disable the vulnerable 'shr' global option until patching is possible.

Remove or comment out any '--shr' options from Copyparty startup commands

Isolate shared files

all

Place files to be shared in separate directories with no other files present.

mkdir isolated_share && mv file_to_share.txt isolated_share/

🧯 If You Can't Patch

  • Disable the shares feature entirely by removing '--shr' options from configuration
  • Implement network-level access controls to limit who can access the Copyparty instance

🔍 How to Verify

Check if Vulnerable:

Check if Copyparty version is below 1.19.8 and if the '--shr' option is used in configuration.

Check Version:

python3 -c "import copyparty; print(copyparty.__version__)" or check startup logs

Verify Fix Applied:

Verify Copyparty version is 1.19.8 or higher and test that shared files in directories with other files cannot be accessed via filename guessing.

📡 Detection & Monitoring

Log Indicators:

  • Multiple 200/206 responses for files in same directory as shared files
  • Access patterns showing enumeration of sibling files

Network Indicators:

  • HTTP requests to files in directories containing shared files without proper authorization

SIEM Query:

source="copyparty.log" AND (status=200 OR status=206) AND uri CONTAINS "/" AND NOT uri CONTAINS shared_filename

🔗 References

📤 Share & Export