The SVGMagic WordPress plugin through 1.1 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/7a3b89cc-7a81-448a-94fc-36a7033609d5/ | Exploit Third Party Advisory |
Configurations
History
29 Jul 2024, 16:31
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:andibauer:svgmagic:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CWE | CWE-79 | |
References | () https://wpscan.com/vulnerability/7a3b89cc-7a81-448a-94fc-36a7033609d5/ - Exploit, Third Party Advisory | |
First Time |
Andibauer svgmagic
Andibauer |
Information
Published : 2024-06-14 06:15
Updated : 2024-07-29 16:31
NVD link : CVE-2024-4270
Mitre link : CVE-2024-4270
CVE.ORG link : CVE-2024-4270
JSON object : View
Products Affected
andibauer
- svgmagic
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')