PrivateBin is an online pastebin where the server has zero knowledge of pasted data. Starting in version 1.7.7 and prior to version 2.0.3, dragging a file whose filename contains HTML is reflected verbatim into the page via the drag-and-drop helper, so any user who drops a crafted file on PrivateBin will execute arbitrary JavaScript within their own session (self-XSS). This allows an attacker who can entice a victim to drag or otherwise attach such a file to exfiltrate plaintext, encryption keys, or stored pastes before they are encrypted or sent. Certain conditions must exist for the vulnerability to be exploitable. Only macOS or Linux users are affected, due to the way the `>` character is treated in a file name on Windows. The PrivateBin instance needs to have file upload enabled. An attacker needs to have access to the local file system or somehow convince the user to create (or download) a malicious file (name). An attacker needs to convince the user to attach that malicious file to PrivateBin. Any Mac / Linux user who can be tricked into dragging a maliciously named file into the editor is impacted; code runs in the origin of the PrivateBin instance they are using. Attackers can steal plaintext, passphrases, or manipulate the UI before data is encrypted, defeating the zero-knowledge guarantees for that victim session, assuming counter-measures like Content-Security-Policy (CSP) have been disabled. If CSP is not disabled, HTML injection attacks may be possible - like redirecting to a foreign website, phishing etc. As the whole exploit needs to be included in the file name of the attached file and only affects the local session of the user (aka it is neither persistent nor remotely executable) and that user needs to interact and actively attach that file to the paste, the impact is considered to be practically low. Version 2.0.3 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/PrivateBin/PrivateBin/commit/f9550e513381208b36595ee2404e968144bba78b | Patch |
| https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-r9x7-7ggj-fx9f | Exploit Vendor Advisory Mitigation |
| https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-r9x7-7ggj-fx9f | Exploit Vendor Advisory Mitigation |
Configurations
History
25 Nov 2025, 17:37
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:* | |
| First Time |
Privatebin privatebin
Privatebin |
|
| References | () https://github.com/PrivateBin/PrivateBin/commit/f9550e513381208b36595ee2404e968144bba78b - Patch | |
| References | () https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-r9x7-7ggj-fx9f - Exploit, Vendor Advisory, Mitigation |
13 Nov 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-r9x7-7ggj-fx9f - |
13 Nov 2025, 03:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-13 03:16
Updated : 2025-11-25 17:37
NVD link : CVE-2025-64711
Mitre link : CVE-2025-64711
CVE.ORG link : CVE-2025-64711
JSON object : View
Products Affected
privatebin
- privatebin
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
