PatchSiren cyber security CVE debrief
CVE-2022-50957 Drupal CVE debrief
CVE-2022-50957 is a reflected cross-site scripting (XSS) vulnerability associated with Drupal’s avatar_uploader 7.x-1.0-beta8. According to the NVD record and the referenced VulnCheck disclosure, an unauthenticated attacker can manipulate the file parameter in avatar_uploader.pages.inc to inject script content that executes in a victim’s browser. The issue is rated medium severity (CVSS 5.1) and is user-interaction dependent, which limits direct remote impact but still creates risk for phishing, session theft, and trusted-site abuse.
- Vendor
- Drupal
- Product
- Unknown
- CVSS
- MEDIUM 5.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-10
- Original CVE updated
- 2026-05-10
- Advisory published
- 2026-05-10
- Advisory updated
- 2026-05-10
Who should care
Administrators and developers running Drupal sites that use the avatar_uploader 7.x-1.0-beta8 module should treat this as relevant. It is especially important for any deployment that exposes avatar upload or related public request paths to unauthenticated users.
Technical summary
The vulnerability is a reflected XSS condition in avatar_uploader.pages.inc where the file parameter can be crafted to carry script payloads. The NVD entry classifies the weakness as CWE-79. Because execution occurs in a browser after a victim follows a maliciously constructed URL, the attacker does not need prior authentication, but user interaction is required.
Defensive priority
Medium. The CVSS score is 5.1 and the attack requires user interaction, but the flaw is unauthenticated and can execute arbitrary JavaScript in a victim browser, so exposed deployments should be reviewed promptly.
Recommended defensive actions
- Confirm whether avatar_uploader 7.x-1.0-beta8 is installed or reachable in any Drupal environment.
- Remove, disable, or upgrade the affected module if a fixed version is available through the project maintainer.
- Review request handling for the file parameter and ensure output encoding and input validation are applied consistently.
- Check public-facing links or workflows that could send users to attacker-crafted URLs containing the vulnerable parameter.
- Monitor for suspicious browser-side behavior or reports of unexpected script execution tied to avatar upload pages.
Evidence notes
This debrief is based on the supplied NVD record for CVE-2022-50957 and the referenced source items from VulnCheck, including the Drupal project page and a linked advisory reference. The corpus identifies the weakness as reflected XSS (CWE-79) and states that the file parameter in avatar_uploader.pages.inc can be manipulated to inject script content. No additional exploitation details are included here.
Official resources
Publicly disclosed in the source corpus by VulnCheck, with the NVD record updated on 2026-05-10. The supplied references point to the Drupal project page and related advisory material.