CVE-2022-50951

medium

Description

WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions.

References

https://www.vulnerability-lab.com/get_content.php?id=2322

https://www.vulncheck.com/advisories/wifi-file-transfer-persistent-xss-via-web-server-input-validation

https://play.google.com/store/apps/details?id=com.dooblou.WiFiFileExplorerPRO&hl=en_US

Details

Source: Mitre, NVD

Published: 2026-02-01

Updated: 2026-02-01

Risk Information

CVSS v2

Base Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 6.4

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Severity: Medium

CVSS v4

Base Score: 5.1

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

Severity: Medium