The plugin does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads
As an author or above, upload the below SVG file via the Media library: The XSS will be triggered when accessing the file directly, e.g https://example.com/wp-content/uploads/2022/05/xss.svg
CPE | Name | Operator | Version |
---|---|---|---|
enable-svg | lt | 1.4.0 |