seafile CVE Vulnerabilities & Metrics

Focus on seafile vulnerabilities and metrics.

Last updated: 16 Jan 2026, 23:25 UTC

About seafile Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with seafile. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total seafile CVEs: 11
Earliest CVE date: 19 Mar 2018, 21:29 UTC
Latest CVE date: 04 Dec 2025, 16:16 UTC

Latest CVE reference: CVE-2025-65516

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 3

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical seafile CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.44

Max CVSS: 5.0

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 6
4.0-6.9 5
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS seafile CVEs

These are the five CVEs with the highest CVSS scores for seafile, sorted by severity first and recency.

All CVEs for seafile

CVE-2025-65516 seafile vulnerability CVSS: 0 04 Dec 2025, 16:16 UTC

A stored cross-site scripting (XSS) vulnerability was discovered in Seafile Community Edition prior to version 13.0.12. When Seafile is configured with the Golang file server, an attacker can upload a crafted SVG file containing malicious JavaScript and share it using a public link. Opening the link triggers script execution in the victim's browser. This issue has been fixed in Seafile Community Edition 13.0.12.

CVE-2025-41080 seafile vulnerability CVSS: 0 04 Dec 2025, 12:16 UTC

A stored Cross-Site Scripting (XSS) vulnerability has been found in Seafile v12.0.10. This vulnerability allows an attacker to execute arbitrary code in the victim's browser by storing malicious payloads with POST parámetro 'p' in '/api/v2.1/repos/{repo_id}/file/'.

CVE-2025-41079 seafile vulnerability CVSS: 0 04 Dec 2025, 12:16 UTC

A stored Cross-Site Scripting (XSS) vulnerability has been found in Seafile v12.0.10. This vulnerability allows an attacker to execute arbitrary code in the victim's browser by storing malicious payloads with PUT parámetro 'name' in '/api/v2.1/user/'.

CVE-2023-28874 seafile vulnerability CVSS: 0 09 Dec 2023, 07:15 UTC

The next parameter in the /accounts/login endpoint of Seafile 9.0.6 allows attackers to redirect users to arbitrary sites.

CVE-2023-28873 seafile vulnerability CVSS: 0 09 Dec 2023, 07:15 UTC

An XSS issue in wiki and discussion pages in Seafile 9.0.6 allows attackers to inject JavaScript into the Markdown editor.

CVE-2021-43820 seafile vulnerability CVSS: 4.3 14 Dec 2021, 19:15 UTC

Seafile is an open source cloud storage system. A sync token is used in Seafile file syncing protocol to authorize access to library data. To improve performance, the token is cached in memory in seaf-server. Upon receiving a token from sync client or SeaDrive client, the server checks whether the token exist in the cache. However, if the token exists in cache, the server doesn't check whether it's associated with the specific library in the URL. This vulnerability makes it possible to use any valid sync token to access data from any **known** library. Note that the attacker has to first find out the ID of a library which it has no access to. The library ID is a random UUID, which is not possible to be guessed. There are no workarounds for this issue.

CVE-2021-30146 seafile vulnerability CVSS: 3.5 06 Apr 2021, 16:15 UTC

Seafile 7.0.5 (2019) allows Persistent XSS via the "share of library functionality."

CVE-2020-16143 seafile vulnerability CVSS: 4.4 29 Jul 2020, 22:15 UTC

The seafile-client client 7.0.8 for Seafile is vulnerable to DLL hijacking because it loads exchndl.dll from the current working directory.

CVE-2013-7469 seafile vulnerability CVSS: 5.0 21 Feb 2019, 03:29 UTC

Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.

CVE-2019-8919 seafile vulnerability CVSS: 5.0 18 Feb 2019, 20:29 UTC

The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.

CVE-2014-5443 seafile vulnerability CVSS: 4.6 19 Mar 2018, 21:29 UTC

Seafile Server before 3.1.2 and Server Professional Edition before 3.1.0 allow local users to gain privileges via vectors related to ccnet handling user accounts.