The SVG Support WordPress plugin before 2.3.20 does not escape the "CSS Class to target" setting before outputting it in an attribute, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/38018695-901d-48d9-b39a-7c00df7f0a4b | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2651929 | Patch Third Party Advisory |
Configurations
Information
Published : 2022-02-01 05:15
Updated : 2022-02-04 09:30
NVD link : CVE-2021-24686
Mitre link : CVE-2021-24686
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
svg_support_project
- svg_support