CVE-2020-36988
Description
PDW File Browser version 1.3 contains stored and reflected cross-site scripting vulnerabilities that allow authenticated attackers to inject malicious scripts through file rename and path parameters. Attackers can craft malicious URLs or rename files with XSS payloads to execute arbitrary JavaScript in victims' browsers when they access the file browser.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
PDW File Browser <=1.3 has stored and reflected XSS flaws allowing authenticated attackers to execute arbitrary JavaScript via crafted file names or path parameters.
Vulnerability
Overview
PDW File Browser version 1.3, a plugin for TinyMCE and CKEditor, contains both stored and reflected cross-site scripting (XSS) vulnerabilities. The root cause is insufficient input sanitization in the file rename functionality and the path parameter used when fetching file specifications. This allows authenticated attackers to inject malicious scripts that execute in the browsers of other authenticated users [1][2].
Exploitation
Exploitation
For stored XSS, an attacker can rename a file to include an XSS payload (e.g., `) via a POST request to actions.php. The payload executes when any authenticated user navigates to the PDW File Browser page. For reflected XSS, an attacker crafts a URL with a malicious path parameter in path parameter in file_specs.php (e.g., ?ajax=true&path=`). When an authenticated user visits the crafted URL, the payload executes immediately [1].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the victim's browser within the context of the PDW File Browser application. This can lead to session hijacking, data theft, or further malicious actions, all while the victim is authenticated [1][2].
Mitigation
As of the advisory publication date (October 2020), no patched version was available. Users of PDW File Browser version 1.3 or earlier are advised to upgrade to a newer version if available, or to implement input validation and output encoding as a workaround. The vulnerability is publicly documented in the Exploit Database [1] and tracked by VulnCheck [2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.