VYPR
Medium severityNVD Advisory· Published Feb 3, 2026· Updated Apr 15, 2026

CVE-2020-37087

CVE-2020-37087

Description

Easy Transfer Wifi Transfer v1.7 for iOS contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious scripts by manipulating the oldPath, newPath, and path parameters in Create Folder and Move/Edit functions. Attackers can exploit improper input validation via POST requests to execute arbitrary JavaScript in the context of the mobile web application.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Easy Transfer Wifi Transfer v1.7 for iOS is vulnerable to persistent cross-site scripting via improper input validation in folder creation and move/edit functions.

Vulnerability

Overview

Easy Transfer Wifi Transfer v1.7 for iOS contains a persistent cross-site scripting (XSS) vulnerability. The root cause is improper input validation of the oldPath, newPath, and path parameters in the Create Folder and Move/Edit functions. Attackers can inject arbitrary JavaScript code through these parameters, which is then stored and executed in the context of the mobile web application [1][4].

Exploitation

An attacker can exploit this vulnerability by sending specially crafted POST requests to the affected endpoints. No authentication is required, as the application operates with open privileges [1]. The injected script executes when other users access the manipulated folder or file operations, leading to persistent XSS. User interaction is minimal, typically just viewing the affected page [1].

Impact

Successful exploitation allows arbitrary JavaScript execution within the web interface of the Easy Transfer app. This can lead to data theft, session hijacking, defacement, or further compromise of the user's device and files transferred through the application [4].

Mitigation

As of the public disclosure date (April 2020), no official patch has been released for this vulnerability. The application remains available on the Apple App Store [3]. Users are advised to exercise caution when using the app, avoid accessing untrusted content, and consider alternative file transfer solutions until a fix is provided [1][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.