WordPress File Upload plugin vulnerable to Stored Cross-Site Scripting
CVE-2024-7301
7.2HIGH
Summary
The WordPress File Upload plugin for WordPress exposes a vulnerability that allows stored Cross-Site Scripting attacks through improperly handled SVG file uploads in all versions up to and including 4.24.8. This vulnerability arises from a lack of sufficient input sanitization and output escaping, enabling unauthenticated attackers to embed arbitrary web scripts in SVG files. When users access the compromised SVG file, the injected scripts are executed, potentially leading to unauthorized actions on the affected WordPress sites.
Affected Version(s)
WordPress File Upload * <= 4.24.8
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
wesley