Home

Description

Owlfiles File Manager 12.0.1 contains a cross-site scripting vulnerability that allows attackers to inject malicious scripts through the path parameter in HTTP server endpoints. Attackers can craft URLs targeting the download and list endpoints with embedded script tags to execute arbitrary JavaScript in users' browsers.

PUBLISHED Reserved 2026-01-10 | Published 2026-01-13 | Updated 2026-02-02 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 5.0CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

12.0.1
affected

Credits

Chokri Hammedi finder

References

www.exploit-db.com/exploits/51036 exploit

www.exploit-db.com/exploits/51036 (ExploitDB-51036) exploit

www.skyjos.com/ (Vendor Homepage) product

apps.apple.com/us/app/owlfiles-file-manager/id510282524 (Official App Store Listing) product

www.vulncheck.com/...er-cross-site-scripting-via-http-server (VulnCheck Advisory: Owlfiles File Manager 12.0.1 Cross-Site Scripting via HTTP Server) third-party-advisory

cve.org (CVE-2022-50891)

nvd.nist.gov (CVE-2022-50891)

Download JSON