VYPR
Medium severity6.4NVD Advisory· Published Feb 1, 2026· Updated Apr 15, 2026

CVE-2023-54343

CVE-2023-54343

Description

QWE DL 2.0.1 mobile web application contains a persistent input validation vulnerability allowing remote attackers to inject malicious script code through path parameter manipulation. Attackers can exploit the vulnerability to execute persistent cross-site scripting attacks, potentially leading to session hijacking and application module manipulation.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

QWE DL 2.0.1 for iOS contains a persistent XSS vulnerability via path parameter manipulation, enabling remote attackers to execute malicious scripts without authentication.

Vulnerability

Overview

QWE DL v2.0.1, an iOS mobile web application for file management, suffers from a persistent cross-site scripting (XSS) vulnerability due to improper input validation in the path parameter [1][3]. The web application's GCDWebUploader component fails to sanitize user-supplied input, allowing attackers to inject arbitrary script code that is stored and later served to other users [1].

Exploitation

The vulnerability can be exploited remotely by manipulating the path parameter in requests to the web interface. No authentication is required, making it accessible to any attacker who can reach the application's network endpoint [1][3]. However, the attack requires low user interaction, as the victim must navigate to the affected page where the malicious script is stored [1].

Impact

Successful exploitation enables persistent XSS attacks, potentially leading to session hijacking and manipulation of application modules [1][3]. The attacker could steal session tokens, perform actions on behalf of the victim, or modify the application's behavior. The CVSS v3 score is 6.4 (Medium), reflecting the moderate severity [3].

Mitigation

The vulnerability was disclosed in July 2023, but vendor responsiveness is unclear from the advisory [1]. As of the latest available version (2.0.1, last updated April 2016), no official patch has been confirmed [2]. Users should consider limiting exposure by restricting network access to the application and monitoring for suspicious activity [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.