Owlfiles File Manager 12.0.1 contains a cross-site scripting vulnerability that allows attackers to inject malicious scripts through the path parameter in HTTP server endpoints. Attackers can craft URLs targeting the download and list endpoints with embedded script tags to execute arbitrary JavaScript in users' browsers.
References
| Link | Resource |
|---|---|
| https://apps.apple.com/us/app/owlfiles-file-manager/id510282524 | Product |
| https://www.exploit-db.com/exploits/51036 | Exploit |
| https://www.skyjos.com/ | Product |
| https://www.vulncheck.com/advisories/owlfiles-file-manager-cross-site-scripting-via-http-server | Third Party Advisory |
| https://www.exploit-db.com/exploits/51036 | Exploit |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-13 23:15
Updated : 2026-02-02 16:16
NVD link : CVE-2022-50891
Mitre link : CVE-2022-50891
CVE.ORG link : CVE-2022-50891
JSON object : View
Products Affected
skyjos
- owlfiles
apple
- ipados
- iphone_os
- tvos
- visionos
- macos
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
