Vulnerability Description
WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://play.google.com/store/apps/details?id=com.dooblou.WiFiFileExplorerPRO&hl
- https://www.vulncheck.com/advisories/wifi-file-transfer-persistent-xss-via-web-s
- https://www.vulnerability-lab.com/get_content.php?id=2322
FAQ
What is CVE-2022-50951?
CVE-2022-50951 is a vulnerability with a CVSS score of 6.4 (MEDIUM). WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the...
How severe is CVE-2022-50951?
CVE-2022-50951 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-50951?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.