WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions.
History

Sun, 01 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions.
Title WiFi File Transfer 1.0.8 Persistent XSS via Web Server Input Validation
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-01T12:56:57.389Z

Reserved: 2026-01-11T13:34:26.331Z

Link: CVE-2022-50951

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-01T13:15:57.817

Modified: 2026-02-01T13:15:57.817

Link: CVE-2022-50951

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.