{"id":"CVE-2025-64176","summary":"ThinkDashboard: Arbitrary File Upload vulnerability in the Backup Import Feature","details":"ThinkDashboard is a self-hosted bookmark dashboard built with Go and vanilla JavaScript. In versions 0.6.7 and below, an attacker can upload any file they wish to the /data directory of the web application via the backup import feature. When importing a backup, an attacker can first choose a .zip file to bypass the client-side file-type verification. This could lead to stored XSS, or be used for other nefarious purposes such as malware distribution. This issue is fixed in version 0.6.8.","aliases":["GHSA-jvmw-hg62-jr47"],"modified":"2026-04-02T12:59:10.818095Z","published":"2025-11-06T21:12:38.265Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64176.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-20","CWE-434","CWE-79"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64176.json"},{"type":"ADVISORY","url":"https://github.com/MatiasDesuu/ThinkDashboard/security/advisories/GHSA-jvmw-hg62-jr47"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-64176"},{"type":"FIX","url":"https://github.com/MatiasDesuu/ThinkDashboard/commit/18d2f6aded0d6424cc4c8619731dd20563f4cfd8"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/matiasdesuu/thinkdashboard","events":[{"introduced":"0"},{"fixed":"303cc0d1b3f7dafcfaeaaf75dd5cc4714689526f"}]}],"versions":["0.2","0.2.1","0.3","0.3.1","0.4","0.4.5","0.5","0.5.5","0.6","0.6.5","0.6.6","0.6.7"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64176.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}