WordPress File Upload plugin vulnerable to Stored Cross-Site Scripting
CVE-2024-7301

7.2HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
16 August 2024

Summary

The WordPress File Upload plugin for WordPress exposes a vulnerability that allows stored Cross-Site Scripting attacks through improperly handled SVG file uploads in all versions up to and including 4.24.8. This vulnerability arises from a lack of sufficient input sanitization and output escaping, enabling unauthenticated attackers to embed arbitrary web scripts in SVG files. When users access the compromised SVG file, the injected scripts are executed, potentially leading to unauthorized actions on the affected WordPress sites.

Affected Version(s)

WordPress File Upload * <= 4.24.8

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

wesley
.