LocalSend is an open-source app to securely share files and messages with nearby devices over local networks without needing an internet connection. In versions 1.16.1 and below, a critical Man-in-the-Middle (MitM) vulnerability in the software's discovery protocol allows an unauthenticated attacker on the same local network to impersonate legitimate devices, silently intercepting, reading, and modifying any file transfer. This can be used to steal sensitive data or inject malware, like ransomware, into files shared between trusted users. The attack is hardly detectable and easy to implement, posing a severe and immediate security risk. This issue was fixed in version 1.17.0.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Aug 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 04 Aug 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Localsend
Localsend localsend |
|
Vendors & Products |
Localsend
Localsend localsend |
Fri, 01 Aug 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | LocalSend is an open-source app to securely share files and messages with nearby devices over local networks without needing an internet connection. In versions 1.16.1 and below, a critical Man-in-the-Middle (MitM) vulnerability in the software's discovery protocol allows an unauthenticated attacker on the same local network to impersonate legitimate devices, silently intercepting, reading, and modifying any file transfer. This can be used to steal sensitive data or inject malware, like ransomware, into files shared between trusted users. The attack is hardly detectable and easy to implement, posing a severe and immediate security risk. This issue was fixed in version 1.17.0. | |
Title | LocalSend is Vulnerable to Man-in-the-Middle Attacks, Leading to File Interception | |
Weaknesses | CWE-300 CWE-345 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-01T23:04:29.207Z
Updated: 2025-08-04T14:19:20.337Z
Reserved: 2025-07-29T16:50:28.394Z
Link: CVE-2025-54792

Updated: 2025-08-04T14:19:08.787Z

Status : Awaiting Analysis
Published: 2025-08-01T23:15:25.143
Modified: 2025-08-04T15:15:32.670
Link: CVE-2025-54792

No data.