logo

CVE-2022-1091 darylldoyle/safe-svg

Package

Manager: composer
Name: darylldoyle/safe-svg
Vulnerable Version: >=0 <1.9.10

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

EPSS: 0.00444 pctl0.62488

Details

Cross site scripting in safe-svg The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks).

Metadata

Created: 2022-04-19T00:00:45Z
Modified: 2022-04-28T21:15:03Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-5h7w-hmxc-99g5/GHSA-5h7w-hmxc-99g5.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-5h7w-hmxc-99g5
Finding: F425
Auto approve: 1