WordPress Plugin Vulnerabilities
SVG Support < 2.3.20 - Admin+ Stored Cross-Site Scripting
Description
The plugin does not escape the "CSS Class to target" setting before outputting it in an attribute, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Proof of Concept
With the Advanced Mode enabled, put the following payload in the "CSS Class to target" setting: "><script>alert(/XSS/)</script>
Affects Plugins
References
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Shivam Rai
Submitter
Shivam Rai
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-01-03 (about 2 years ago)
Added
2022-01-03 (about 2 years ago)
Last Updated
2022-04-16 (about 2 years ago)