Ad

CVE-2026-30587

HIGH CVSS 3.1: 8.7 EPSS 0.05%
Updated Mar 31, 2026
Seafile
Parameter Value
CVSS 8.7 (HIGH)
Affected Versions before 12.0.20
Fixed In 13.0.17
Type CWE-79 (Cross-Site Scripting (XSS))
Vendor Seafile
Public PoC No

Multiple Stored XSS vulnerabilities exist in Seafile Server version 13.0.15,13.0.16-pro,12.0.14 and prior and fixed in 13.0.17, 13.0.17-pro, and 12.0.20-pro, via the Seadoc (sdoc) editor. The application fails to properly sanitize WebSocket messages regarding document structure updates. This allows authenticated remote attackers to inject malicious JavaScript payloads via the src attribute of embedded Excalidraw whiteboards or the href attribute of anchor tags

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 3

Configuration From (including) Up to (excluding)
Seafile Seafile_Server
cpe:2.3:a:seafile:seafile_server:*:*:*:*:professional:*:*:*
12.0.20
Seafile Seafile_Server
cpe:2.3:a:seafile:seafile_server:13.0.15:*:*:*:community:*:*:*
Seafile Seafile_Server
cpe:2.3:a:seafile:seafile_server:13.0.16:*:*:*:professional:*:*:*