Cross site scripting in safe-svg
Moderate severity
GitHub Reviewed
Published
Apr 19, 2022
to the GitHub Advisory Database
•
Updated Apr 17, 2023
Description
Published by the National Vulnerability Database
Apr 18, 2022
Published to the GitHub Advisory Database
Apr 19, 2022
Reviewed
Apr 28, 2022
Last updated
Apr 17, 2023
The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks).
References