CVE-2022-50949
Description
WordPress Plugin Videos sync PDF 1.7.4 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts by exploiting unsanitized mov, pdf, mp4, webm, and ogg parameters. Attackers can inject payloads like autofocus onfocus event handlers through the plugin options panel to execute arbitrary JavaScript when administrators view or edit video settings.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
WordPress Videos sync PDF plugin 1.7.4 has a stored XSS vulnerability allowing authenticated attackers to inject arbitrary JavaScript via unsanitized parameters in the plugin settings panel.
The WordPress plugin Videos sync PDF version 1.7.4 contains a stored cross-site scripting (XSS) vulnerability. The plugin fails to properly sanitize user-supplied input in the nom, pdf, mp4, webm, and ogg parameters within its options panel, allowing arbitrary HTML and JavaScript to be injected. Attackers can insert payloads such as " autofocus onfocus=alert(/XSS/)> that become permanently stored [1] [2].
Exploitation
An authenticated attacker with access to the plugin settings page (at /wp-admin/admin.php?page=aje_videosyncropdf_videos) can inject a malicious payload into any of the vulnerable fields. The stored script executes automatically when an administrator subsequently views or edits the video settings, due to the injected onfocus event handler. No additional user interaction is required beyond loading the affected admin page [1] [2].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the WordPress admin panel. This can be leveraged to perform administrative actions on behalf of the victim, steal session tokens or cookies, or deface the site. The vulnerability is classified as medium severity with a CVSS v3 score of 6.4 [2].
Mitigation
As of the advisory date, version 1.7.4 is the affected release. No patched version has been confirmed in the references. Users are advised to remove or disable the plugin until an update is available, or to sanitize input fields via a Web Application Firewall (WAF) rule as a temporary workaround.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2=1.7.4+ 1 more
- (no CPE)range: =1.7.4
- (no CPE)range: =1.7.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.