Stored Cross-Site Scripting (XSS) vulnerability in WordPress via SVG File uploads
CVE-2024-9443
5.4MEDIUM
Key Information:
- Vendor
- Basticom
- Status
- Basticom Framework
- Vendor
- CVE Published:
- 5 November 2024
Summary
The Basticom Framework plugin for WordPress suffers from a Stored Cross-Site Scripting vulnerability due to inadequate input sanitization and output escaping when processing SVG file uploads. Authenticated users with Author-level access and above can exploit this weakness to inject and execute arbitrary web scripts within the content. This vulnerability poses a significant risk as it enables attackers to manipulate user sessions and potentially gain unauthorized access to sensitive data when users view the affected SVG files. Proper updates and security measures are essential to mitigate risk.
Affected Version(s)
Basticom Framework * <= 1.5.0
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Francesco Carlucci