Overview
- Description
- The SVG Case Study plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
- Source
- security@wordfence.com
- NVD status
- Received
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.4
- Impact score
- 2.7
- Exploitability score
- 3.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Weaknesses
- security@wordfence.com
- CWE-79
Social media
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
1
CVE-2024-9850 Stored XSS Vulnerability in SVG Case Study WordPress Plugin 1.0 The SVG Case Study plugin for WordPress has a Stored Cross-Site Scripting vulnerability. This happens when uploading SVG files in any ... https://t.co/NaCQ599eCY
@VulmonFeeds
16 Nov 2024
65 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-9850 The SVG Case Study plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0 due to insufficient … https://t.co/wCi0D1hubf
@CVEnew
16 Nov 2024
393 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes