Impact
The Smart Icons For WordPress plugin permits users to upload SVG files, but the code fails to sanitize and escape user input. Consequently, an attacker with Editor-level or higher privileges can embed malicious script tags inside an SVG upload, causing those scripts to run whenever any site visitor loads the file. This stored cross‑site scripting flaw is a classic CWE‑79 problem that can lead to session hijacking, defacement, or credential theft.
Affected Systems
All WordPress installations that have the Smart Icons For WordPress plugin (smartpixels:Smart Icons For WordPress) at version 1.0.4 or earlier are affected. Any site running this plugin and allowing SVG uploads is vulnerable.
Risk and Exploitability
The vulnerability carries a CVSS score of 6.4, indicating moderate severity. Its EPSS score is below 1%, suggesting that exploitation attempts are currently rare, and it is not listed in the CISA KEV catalog. However, because the flaw requires authenticated access with at least Editor rights, the attack vector is internal, so attackers must already have legitimate site access to exploit it.
OpenCVE Enrichment
EUVD