The AVIF & SVG Uploader plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in version 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Metrics
Affected Vendors & Products
References
History
Tue, 01 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 01 Oct 2024 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The AVIF & SVG Uploader plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in version 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | |
| Title | AVIF & SVG Uploader <= 1.1.0 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-01T09:30:31.950Z
Updated: 2024-10-01T13:31:50.198Z
Reserved: 2024-09-20T21:27:04.946Z
Link: CVE-2024-9060
Updated: 2024-10-01T13:31:46.115Z
Status : Awaiting Analysis
Published: 2024-10-01T10:15:03.983
Modified: 2024-10-04T13:51:25.567
Link: CVE-2024-9060
No data.