Stored Cross-Site Scripting (XSS) vulnerability in WordPress via SVG File uploads
CVE-2024-9443

5.4MEDIUM

Key Information:

Vendor
Basticom
Status
Basticom Framework
Vendor
CVE Published:
5 November 2024

Summary

The Basticom Framework plugin for WordPress suffers from a Stored Cross-Site Scripting vulnerability due to inadequate input sanitization and output escaping when processing SVG file uploads. Authenticated users with Author-level access and above can exploit this weakness to inject and execute arbitrary web scripts within the content. This vulnerability poses a significant risk as it enables attackers to manipulate user sessions and potentially gain unauthorized access to sensitive data when users view the affected SVG files. Proper updates and security measures are essential to mitigate risk.

Affected Version(s)

Basticom Framework * <= 1.5.0

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

Francesco Carlucci
.