5.4
CVE-2021-24960
- EPSS 0.25%
- Veröffentlicht 07.03.2022 09:15:08
- Zuletzt bearbeitet 21.11.2024 05:54:05
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
WordPress File Upload <= 4.16.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Malicious SVG
The WordPress File Upload WordPress plugin before 4.16.3, wordpress-file-upload-pro WordPress plugin before 4.16.3 allows users with a role as low as Contributor to configure the upload form in a way that allows uploading of SVG files, which could be then be used for Cross-Site Scripting attacks
Mögliche Gegenmaßnahme
Iptanus File Upload: Update to version 4.16.3, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Iptanus File Upload
Version
[*, 4.16.3)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Iptanus ≫ Wordpress File Upload SwPlatformwordpress Version < 4.16.3
Iptanus ≫ Wordpress File Upload Pro SwPlatformwordpress Version < 4.16.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.25% | 0.485 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.4 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
| nvd@nist.gov | 3.5 | 6.8 | 2.9 |
AV:N/AC:M/Au:S/C:N/I:P/A:N
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.