Home

Description

Easy Transfer Wifi Transfer v1.7 for iOS contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious scripts by manipulating the oldPath, newPath, and path parameters in Create Folder and Move/Edit functions. Attackers can exploit improper input validation via POST requests to execute arbitrary JavaScript in the context of the mobile web application.

PUBLISHED Reserved 2026-02-01 | Published 2026-02-03 | Updated 2026-02-04 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

1.7
affected

Credits

Vulnerability Laboratory, Benjamin Kunz Mejri

References

www.exploit-db.com/exploits/48395 (ExploitDB-48395) exploit technical-description

www.vulnerability-lab.com/get_content.php?id=2223 (Vulnerability-Lab Advisory) technical-description exploit

apps.apple.com/...p/easy-transfer-wifi-transfer/id1484667078 (Official App Store Product Page) product

www.vulncheck.com/...for-ios-persistent-cross-site-scripting (VulnCheck Advisory: Easy Transfer 1.7 for iOS - Persistent Cross-Site Scripting) third-party-advisory

cve.org (CVE-2020-37087)

nvd.nist.gov (CVE-2020-37087)

Download JSON