The wp-svg-upload WordPress plugin through 1.0.0 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/f57ecff2-0cff-40c7-b6e4-5b162b847d65/ | Exploit Third Party Advisory |
Configurations
History
25 Jun 2025, 20:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/f57ecff2-0cff-40c7-b6e4-5b162b847d65/ - Exploit, Third Party Advisory | |
First Time |
Wp Svg Upload Project
Wp Svg Upload Project Wp Svg Upload |
|
CPE | cpe:2.3:a:wp_svg_upload_project:_wp_svg_upload:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-79 |
26 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
26 Mar 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-26 06:15
Updated : 2025-06-25 20:43
NVD link : CVE-2024-11847
Mitre link : CVE-2024-11847
CVE.ORG link : CVE-2024-11847
JSON object : View
Products Affected
wp_svg_upload_project
- _wp_svg_upload
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')