CVE-2026-25154

6.1 MEDIUM

📋 TL;DR

LocalSend versions up to 1.17.0 contain a cross-site scripting (XSS) vulnerability in the 'Share via Link' feature. When users share files via link, the web interface improperly sanitizes file names, allowing attackers to inject malicious scripts. This affects all users who share files using the vulnerable versions.

💻 Affected Systems

Products:
  • LocalSend
Versions: Up to and including version 1.17.0
Operating Systems: All platforms where LocalSend runs (Windows, macOS, Linux, Android, iOS)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects users who use the 'Share via Link' feature. Direct file transfers are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could execute arbitrary JavaScript in the context of the LocalSend web interface, potentially stealing session data, redirecting users to malicious sites, or performing actions on behalf of the user.

🟠

Likely Case

Limited impact due to the local network nature of the application, but could enable session hijacking or credential theft if users access the vulnerable web interface.

🟢

If Mitigated

With proper input validation and output encoding, the risk is eliminated as malicious scripts would be properly sanitized.

🌐 Internet-Facing: LOW - The vulnerability requires local network access as LocalSend operates on local networks without internet exposure.
🏢 Internal Only: MEDIUM - Within a local network, an attacker could exploit this if they can trick users into accessing maliciously crafted file shares.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the attacker to be on the same local network and trick a user into accessing a maliciously crafted file share link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.17.0 (fixed in commit 8f3cec85aa29b2b13fed9b2f8e499e1ac9b0504c)

Vendor Advisory: https://github.com/localsend/localsend/security/advisories/GHSA-34v6-52hh-x4r4

Restart Required: Yes

Instructions:

1. Update LocalSend to the latest version. 2. Restart the application. 3. Verify the version is greater than 1.17.0.

🔧 Temporary Workarounds

Disable Share via Link feature

all

Avoid using the vulnerable 'Share via Link' functionality until patched

Network segmentation

all

Restrict LocalSend traffic to trusted devices only on the local network

🧯 If You Can't Patch

  • Disable the 'Share via Link' feature entirely
  • Use LocalSend only on isolated, trusted networks with no untrusted devices

🔍 How to Verify

Check if Vulnerable:

Check LocalSend version in application settings or about dialog. If version is 1.17.0 or lower, you are vulnerable.

Check Version:

Check application settings or about dialog (no universal command as LocalSend is GUI application)

Verify Fix Applied:

After updating, verify version is greater than 1.17.0 and test that file names with special characters display properly without script execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file names containing script tags or JavaScript in LocalSend logs
  • Multiple failed attempts to access file share links

Network Indicators:

  • HTTP requests to LocalSend web interface with suspicious query parameters
  • Unexpected JavaScript execution in LocalSend web sessions

SIEM Query:

Search for LocalSend process activity with file names containing <script> tags or JavaScript patterns

🔗 References

📤 Share & Export