Malicious SVG files can conduct Stored XSS attacks on WordPress plugins before version 1.1.0
CVE-2024-4272
Currently unrated
Key Information:
- Vendor
Wordpress
- Status
- Vendor
- CVE Published:
- 13 July 2024
Badges
👾 Exploit Exists🟡 Public PoC
What is CVE-2024-4272?
The Support SVG WordPress plugin before 1.1.0 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks.
Affected Version(s)
Support SVG 0 < 1.1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.