The WP SVG Images plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘type’ parameter in all versions up to, and including, 4.2 due to insufficient input sanitization. This makes it possible for authenticated attackers, with Author-level access and above, who have permissions to upload sanitized files, to bypass SVG sanitization and inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Configurations
History
No history.
Information
Published : 2024-06-21 08:15
Updated : 2024-06-24 19:24
NVD link : CVE-2024-5945
Mitre link : CVE-2024-5945
CVE.ORG link : CVE-2024-5945
JSON object : View
Products Affected
kubiq
- wp_svg_images
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')