VYPR
Medium severity6.4NVD Advisory· Published May 10, 2026· Updated May 12, 2026

CVE-2022-50949

CVE-2022-50949

Description

WordPress Plugin Videos sync PDF 1.7.4 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts by exploiting unsanitized mov, pdf, mp4, webm, and ogg parameters. Attackers can inject payloads like autofocus onfocus event handlers through the plugin options panel to execute arbitrary JavaScript when administrators view or edit video settings.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

WordPress Videos sync PDF plugin 1.7.4 has a stored XSS vulnerability allowing authenticated attackers to inject arbitrary JavaScript via unsanitized parameters in the plugin settings panel.

The WordPress plugin Videos sync PDF version 1.7.4 contains a stored cross-site scripting (XSS) vulnerability. The plugin fails to properly sanitize user-supplied input in the nom, pdf, mp4, webm, and ogg parameters within its options panel, allowing arbitrary HTML and JavaScript to be injected. Attackers can insert payloads such as " autofocus onfocus=alert(/XSS/)> that become permanently stored [1] [2].

Exploitation

An authenticated attacker with access to the plugin settings page (at /wp-admin/admin.php?page=aje_videosyncropdf_videos) can inject a malicious payload into any of the vulnerable fields. The stored script executes automatically when an administrator subsequently views or edits the video settings, due to the injected onfocus event handler. No additional user interaction is required beyond loading the affected admin page [1] [2].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the WordPress admin panel. This can be leveraged to perform administrative actions on behalf of the victim, steal session tokens or cookies, or deface the site. The vulnerability is classified as medium severity with a CVSS v3 score of 6.4 [2].

Mitigation

As of the advisory date, version 1.7.4 is the affected release. No patched version has been confirmed in the references. Users are advised to remove or disable the plugin until an update is available, or to sanitize input fields via a Web Application Firewall (WAF) rule as a temporary workaround.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.