onionshare CVE Vulnerabilities & Metrics

Focus on onionshare vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About onionshare Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with onionshare. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total onionshare CVEs: 13
Earliest CVE date: 30 Jan 2017, 22:59 UTC
Latest CVE date: 18 Jan 2022, 23:15 UTC

Latest CVE reference: CVE-2022-21694

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical onionshare CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.45

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 2
4.0-6.9 10
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS onionshare CVEs

These are the five CVEs with the highest CVSS scores for onionshare, sorted by severity first and recency.

All CVEs for onionshare

CVE-2022-21694 onionshare vulnerability CVSS: 5.0 18 Jan 2022, 23:15 UTC

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. The website mode of the onionshare allows to use a hardened CSP, which will block any scripts and external resources. It is not possible to configure this CSP for individual pages and therefore the security enhancement cannot be used for websites using javascript or external resources like fonts or images.

CVE-2022-21692 onionshare vulnerability CVSS: 4.0 18 Jan 2022, 23:15 UTC

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat participant.

CVE-2022-21690 onionshare vulnerability CVSS: 3.5 18 Jan 2022, 23:15 UTC

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.

CVE-2022-21695 onionshare vulnerability CVSS: 5.0 18 Jan 2022, 22:15 UTC

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions authenticated users (or unauthenticated in public mode) can send messages without being visible in the list of chat participants. This issue has been resolved in version 2.5.

CVE-2022-21693 onionshare vulnerability CVSS: 4.0 18 Jan 2022, 22:15 UTC

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions an adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced. This can be mitigated by usage of the flatpak release.

CVE-2022-21691 onionshare vulnerability CVSS: 4.0 18 Jan 2022, 22:15 UTC

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions chat participants can spoof their channel leave message, tricking others into assuming they left the chatroom.

CVE-2022-21689 onionshare vulnerability CVSS: 5.0 18 Jan 2022, 22:15 UTC

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions the receive mode limits concurrent uploads to 100 per second and blocks other uploads in the same second, which can be triggered by a simple script. An adversary with access to the receive mode can block file upload for others. There is no way to block this attack in public mode due to the anonymity properties of the tor network.

CVE-2022-21688 onionshare vulnerability CVSS: 4.3 18 Jan 2022, 22:15 UTC

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. Affected versions of the desktop application were found to be vulnerable to denial of service via an undisclosed vulnerability in the QT image parsing. Roughly 20 bytes lead to 2GB memory consumption and this can be triggered multiple times. To be abused, this vulnerability requires rendering in the history tab, so some user interaction is required. An adversary with knowledge of the Onion service address in public mode or with authentication in private mode can perform a Denial of Service attack, which quickly results in out-of-memory for the server. This requires the desktop application with rendered history, therefore the impact is only elevated. This issue has been patched in version 2.5.

CVE-2022-21696 onionshare vulnerability CVSS: 4.0 18 Jan 2022, 20:15 UTC

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions it is possible to change the username to that of another chat participant with an additional space character at the end of the name string. An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.

CVE-2021-41868 onionshare vulnerability CVSS: 7.5 04 Oct 2021, 14:15 UTC

OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.

CVE-2021-41867 onionshare vulnerability CVSS: 5.0 04 Oct 2021, 14:15 UTC

An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.

CVE-2018-19960 onionshare vulnerability CVSS: 4.4 07 Dec 2018, 16:29 UTC

The debug_mode function in web/web.py in OnionShare through 1.3.1, when --debug is enabled, uses the /tmp/onionshare_server.log pathname for logging, which might allow local users to overwrite files or obtain sensitive information by using this pathname.

CVE-2016-5026 onionshare vulnerability CVSS: 2.1 30 Jan 2017, 22:59 UTC

hs.py in OnionShare before 0.9.1 allows local users to modify the hiddenservice by pre-creating the /tmp/onionshare directory.