Description
The URL Image Importer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.7 due to insufficient sanitization of SVG files. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Published: 2026-01-06
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via SVG uploads
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw that allows an attacker with Author‑level permissions to upload an SVG file containing malicious scripts; once stored, any user who accesses the file will have the script executed in their browser, potentially compromising credentials, session data, or enabling further attacks. The flaw stems from insufficient sanitization of SVG content during upload, leading to arbitrary JavaScript injection, and corresponds to CWE‑79.

Affected Systems

Any WordPress site that has installed the URL Image Importer plugin version 1.0.7 or earlier is affected. Any environment where the plugin is present can be exploited if an authenticated Author user exists and can upload SVG files.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity, while an EPSS score of less than 1% shows a very low likelihood of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. Nonetheless, authenticated authors can inject scripts that will run for all users who view the SVG, allowing attackers to steal session information, deface content, or launch further web‑based attacks.

Generated by OpenCVE AI on April 21, 2026 at 16:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the URL Image Importer plugin to a version newer than 1.0.7 or uninstall it if an update is not available
  • Disable SVG file uploads by adjusting the plugin settings or adding a rule in wp-config.php to block the MIME type image/svg+xml
  • Sanitize all uploaded SVG files before rendering, for example by using a library such as DOMPurify or WordPress’ built‑in sanitization functions

Generated by OpenCVE AI on April 21, 2026 at 16:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 06 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 06 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 06 Jan 2026 05:00:00 +0000

Type Values Removed Values Added
Description The URL Image Importer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.7 due to insufficient sanitization of SVG files. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Title URL Image Importer <= 1.0.7 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:04:58.086Z

Reserved: 2025-12-05T16:23:50.971Z

Link: CVE-2025-14120

cve-icon Vulnrichment

Updated: 2026-01-06T15:05:23.491Z

cve-icon NVD

Status : Deferred

Published: 2026-01-06T05:15:49.430

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14120

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:00:12Z

Weaknesses