PrivateBin is an online pastebin where the server has zero knowledge of pasted data. Versions 1.7.7 through 2.0.1 allow persistent HTML injection via the unsanitized attachment filename (attachment_name) when attachments are enabled. An attacker can modify attachment_name before encryption so that, after decryption, arbitrary HTML is inserted unescaped into the page near the file size hint, enabling redirect (e.g., meta refresh) and site defacement and related phishing attacks. Script execution is normally blocked by the recommended Content Security Policy, limiting confidentiality impact. The issue was introduced in 1.7.7 and fixed in 2.0.2. Update to 2.0.2 or later. Workarounds include enforcing the recommended CSP, deploying PrivateBin on a separate domain, or disabling attachments.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 29 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Privatebin Privatebin privatebin | |
| Vendors & Products | Privatebin Privatebin privatebin | 
Tue, 28 Oct 2025 21:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | PrivateBin is an online pastebin where the server has zero knowledge of pasted data. Versions 1.7.7 through 2.0.1 allow persistent HTML injection via the unsanitized attachment filename (attachment_name) when attachments are enabled. An attacker can modify attachment_name before encryption so that, after decryption, arbitrary HTML is inserted unescaped into the page near the file size hint, enabling redirect (e.g., meta refresh) and site defacement and related phishing attacks. Script execution is normally blocked by the recommended Content Security Policy, limiting confidentiality impact. The issue was introduced in 1.7.7 and fixed in 2.0.2. Update to 2.0.2 or later. Workarounds include enforcing the recommended CSP, deploying PrivateBin on a separate domain, or disabling attachments. | |
| Title | PrivateBin persistent HTML injection in attachment filename enables redirect and defacement | |
| Weaknesses | CWE-79 CWE-80 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-29T13:31:54.964Z
Reserved: 2025-10-22T18:55:48.011Z
Link: CVE-2025-62796
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-29T13:30:40.820Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-28T21:15:40.760
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-62796
 Redhat
                        Redhat
                    No data.