CVE-2025-58351

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-58351
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58351.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-58351
Aliases
  • GHSA-gcj7-c9jv-fhgf
Published
2025-09-03T03:20:54.579Z
Modified
2025-12-02T20:14:51.627935Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N CVSS Calculator
Summary
Outline's Local File Storage Feature can Cause CSP Bypass
Details

Outline is a service that allows for collaborative documentation. In versions 0.72.0 through 0.83.0, Outline introduced a feature which facilitates local file system storage capabilities as an optional file storage strategy. This feature allowed a CSP bypass as well as a ContentType bypass that might facilitate further attacks. In the case of self-hosting and using Outline FILE_STORAGE=local on the same domain as the Outline application, a malicious payload can be uploaded as a file attachment and bypass those CSP restrictions, allowing script execution within the context of another user. This is fixed in version 0.84.0.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58351.json"
}
References

Affected packages

Git / github.com/outline/outline

Affected ranges

Type
GIT
Repo
https://github.com/outline/outline
Events

Affected versions

v0.*

v0.72.0
v0.73.0
v0.73.1
v0.75.0
v0.75.1
v0.75.2
v0.76.0
v0.76.0-0
v0.76.0-1
v0.76.0-2
v0.76.1
v0.76.2-0
v0.77.0
v0.77.1
v0.78.0-0
v0.79.0
v0.79.1
v0.80.0
v0.80.1
v0.80.2
v0.82.0