WordPress Plugin Vulnerabilities
Safe SVG < 1.9.10 - SVG Sanitisation Bypass
Description
The sanitisation step of the plugin can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks).
Proof of Concept
Affects Plugins
References
Miscellaneous
Original Researcher
David Hamann
Submitter
David Hamann
Submitter website
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-03-25 (about 3 years ago)
Added
2022-03-25 (about 3 years ago)
Last Updated
2022-04-11 (about 3 years ago)