CVE-2020-36988
Stored and Reflected XSS in PDW File Browser
Publication date: 2026-01-28
Last updated on: 2026-01-28
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pdw_file_browser | pdw_file_browser | 1.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
PDW File Browser version 1.3 has stored and reflected cross-site scripting (XSS) vulnerabilities. Authenticated attackers can inject malicious scripts by renaming files or manipulating path parameters. When victims access the file browser, these scripts execute arbitrary JavaScript in their browsers.
How can this vulnerability impact me? :
This vulnerability can allow attackers to execute arbitrary JavaScript in the browsers of authenticated users, potentially leading to session hijacking, data theft, or other malicious actions within the context of the file browser application.