The WP SVG Images plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘type’ parameter in all versions up to, and including, 4.2 due to insufficient input sanitization. This makes it possible for authenticated attackers, with Author-level access and above, who have permissions to upload sanitized files, to bypass SVG sanitization and inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-06-21T07:39:58.068Z
Updated: 2024-08-01T21:25:03.181Z
Reserved: 2024-06-13T00:42:05.746Z
Link: CVE-2024-5945
Vulnrichment
Updated: 2024-08-01T21:25:03.181Z
NVD
Status : Analyzed
Published: 2024-06-21T08:15:09.860
Modified: 2024-06-24T19:24:00.433
Link: CVE-2024-5945
Redhat
No data.