Malicious SVG Uploads Could Lead to XSS Attacks in WebP & SVG Support WordPress Plugin
CVE-2024-3633

Currently unrated

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
26 June 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

The WebP & SVG Support WordPress plugin through 1.4.0 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads.

Affected Version(s)

WebP & SVG Support 0 <= 1.4.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Bob Matyas
Rayhan Ramdhany Hanaputra
WPScan
.