The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks)
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | Cross site scripting in safe-svg | 19 Apr 202200:00 | – | github |
![]() | Cross site request forgery (csrf) | 18 Apr 202218:15 | – | prion |
![]() | Safe SVG < 1.9.10 - SVG Sanitisation Bypass | 25 Mar 202200:00 | – | wpexploit |
![]() | CVE-2022-1091 Safe SVG < 1.9.10 - SVG Sanitisation Bypass | 18 Apr 202217:10 | – | cvelist |
![]() | CVE-2022-1091 | 18 Apr 202218:15 | – | nvd |
![]() | WordPress Safe SVG Plugin < 1.9.10 Contet-Type Bypass Vulnerability | 18 Sep 202300:00 | – | openvas |
![]() | Cross site scripting in safe-svg | 19 Apr 202200:00 | – | osv |
![]() | CVE-2022-1091 | 18 Apr 202218:15 | – | osv |
![]() | Safe SVG < 1.9.10 - SVG Sanitisation Bypass | 25 Mar 202200:00 | – | wpvulndb |
[
{
"product": "Safe SVG",
"vendor": "Unknown",
"versions": [
{
"lessThan": "1.9.10",
"status": "affected",
"version": "1.9.10",
"versionType": "custom"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo