5.4

CVE-2024-10482

Exploit

Media Library Tools <= 1.4.0 - Authenticated (Author+) Stored Cross-Site Scripting

The Media File Rename, Find Unused File, Add Alt text, Caption, Desc For Image SEO  WordPress plugin before 1.5.0 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads.
Mögliche Gegenmaßnahme
Media File Rename, Unused File Cleaner & CSV Export Import – Add Alt for Image SEO – Media Library Tools: Update to version 1.5.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Media File Rename, Unused File Cleaner & CSV Export Import – Add Alt for Image SEO – Media Library Tools
Version * - 1.4.0
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
WptinysolutionsMedia Library Tools SwPlatformwordpress Version < 1.5.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.214
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 5.4 2.3 2.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.