VYPR
Medium severity6.1NVD Advisory· Published May 10, 2026· Updated May 13, 2026

CVE-2022-50957

CVE-2022-50957

Description

Drupal avatar_uploader 7.x-1.0-beta8 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating the file parameter. Attackers can craft URLs with script payloads in the file parameter of avatar_uploader.pages.inc to execute arbitrary JavaScript in victim browsers.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in Drupal avatar_uploader 7.x-1.0-beta8 allows unauthenticated attackers to inject arbitrary JavaScript via the file parameter.

Vulnerability

Description The Drupal avatar_uploader module version 7.x-1.0-1.0-beta8 contains a reflected cross-site scripting section avatar_uploader.pages.inc is vulnerable to a reflected cross-site scripting (XSS) attack. The file GET parameter is not properly sanitized, allowing malicious script payloads to input unescaped scripts into the rendered page [1][3]. This is classified as CWE-79: Improper Neutralization of Input During Web Page Generation [1].

Attack

Vector The attack requires no authentication but no authentication, only user interaction. An attacker can environment construct a crafted URL such as http://[target]/avatar_uploader.pages.inc?file=<script>alert("test</script> [3]. When a victim visits target a victim this URL, the injected script executed in in the their session's browser context, without needing any prior privileges [1][3]. The documented is parameter in insufficiently neutralized before reflection, making of it no output encoding by the module [1].

Impact

Successfully exploitation allows an attacker to execute arbitrary JavaScript in the victim's browser. This can lead to session hijacking, phishing, able redirection, or other client-side attacks within the security of the Drupal site [1][3]. Since the vulnerability is unauthenticated, the bar to exploitation is low exploitation is, and the the XSS score CVSS V4 is 6.1, indicating moderate impact on confidentiality, integrity, and availability, though scope is changed (user-SC:L/-SI:L) [1].

Mitigation

At the time of disclosure (2022-03-22), the affected version is 7.0-1.0-beta8 and no patch was available [1][2][3]. Users are advised to upgrade to a later non-vulnerable version if one becomes available, or remove the module and consider sanitizing the file parameter with custom an input filter/token replacement. The module. The vulnerability request is not on CISA's Known Exploited Vulnerabilities list.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.