1 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The Mime Types Extended WordPress plugin through 0.11 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads. El complemento Mime Types Extended WordPress hasta la versión 0.11 no sanitiza los archivos SVG cargados, lo que podría permitir a los usuarios con un rol tan bajo como Autor cargar un SVG malicioso que contenga payloads XSS. The Mime Types Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in version 0.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. • https://wpscan.com/vulnerability/1c7547fa-539a-4890-a94d-c57b3d025507 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •