Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  Github GHSA | 
                GHSA-pxfv-7rr3-2qjg | copyparty vulnerable to path traversal attack | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Thu, 04 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        9001
         9001 copyparty  | 
|
| CPEs | cpe:2.3:a:9001:copyparty:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        9001
         9001 copyparty  | 
Fri, 18 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:01:27.796Z
Reserved: 2023-07-06T13:01:36.998Z
Link: CVE-2023-37474
Updated: 2024-08-02T17:16:30.840Z
Status : Modified
Published: 2023-07-14T20:15:09.083
Modified: 2025-09-04T13:04:46.710
Link: CVE-2023-37474
No data.
                        OpenCVE Enrichment
                    No data.
 Github GHSA