The Gutenberg plugin through 13.7.3 for WordPress allows stored XSS by the Contributor role via an SVG document to the "Insert from URL" feature. NOTE: the XSS payload does not execute in the context of the WordPress instance's domain; however, analogous attempts by low-privileged users to reference SVG documents are blocked by some similar products, and this behavioral difference might have security relevance to some WordPress site administrators.
References
Link | Resource |
---|---|
https://blog.jitendrapatro.me/cve-2022-33994-stored-xss-in-wordpress/ | Third Party Advisory |
https://patchstack.com/articles/patchstack-weekly-svg-xss-reported-in-gutenberg/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-07-30 20:15
Updated : 2022-08-16 14:09
NVD link : CVE-2022-33994
Mitre link : CVE-2022-33994
CVE.ORG link : CVE-2022-33994
JSON object : View
Products Affected
gutenberg_project
- gutenberg
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')