WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions.
Metrics
Affected Vendors & Products
References
History
Sun, 01 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions. | |
| Title | WiFi File Transfer 1.0.8 Persistent XSS via Web Server Input Validation | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-01T12:56:57.389Z
Reserved: 2026-01-11T13:34:26.331Z
Link: CVE-2022-50951
No data.
Status : Received
Published: 2026-02-01T13:15:57.817
Modified: 2026-02-01T13:15:57.817
Link: CVE-2022-50951
No data.
OpenCVE Enrichment
No data.