Skip to content
  • Pricing
  • Knowledge base
  • Support
  • Pricing
  • Knowledge base
  • Support
  • > Get Pro <
  • Pricing
  • Knowledge base
  • Support
  • Account area
  • > Get Pro <
  • Pricing
  • Knowledge base
  • Support
  • Account area
Login
Log out
Get PRO

  1. Home
  2. »
  3. Vulnerabilities
  4. »
  5. Input validation vulnerability in Relogo 0.4.2

Latest

Passkeys: no need for Limit Login Attempts?

  • Pricing
  • Knowledge base
  • Support
  • Pricing
  • Knowledge base
  • Support

Input validation vulnerability in Relogo 0.4.2

  • CVE-2024-9269
  • Severity: medium-risk
  • Status: Open
  • Publication: September 30, 2024

The plugin called Relogo, which is used on WordPress websites, has a security issue that allows hackers to upload SVG files containing harmful code. This can happen on any version of the plugin, including the latest one. The problem is caused by not properly checking the input and output of the code. As a result, attackers who have at least Author-level access to the website can insert their own code into pages that will run when someone opens the SVG file.

Detected in:

Relogo open vulnerable versions: >= * <= 0.4.2
  • Open source

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

  • Version compare

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

  • Incorrect?

Is this information incorrect? Please leave us a message.

Join our mailing list - 6 Tips & Tricks in your inbox over the next days!

Plugins

  • Really Simple Security
  • Complianz
  • SimplyBook.me

© Really Simple Plugins
CoC 70461155
Kalmarweg 14-5
9723 JG, Groningen (NL)

Wordpress Linkedin Github

Get Started

  • Pricing
  • Knowledge Base
  • Support
  • F.A.Q
  • Account
  • Become an Affiliate

About

  • About Us
  • Privacy Statement
  • Cookie Policy
  • Terms of Use
  • Coordinated Vulnerability Disclosure

Popular articles

  • Why WordPress is (in)secure
  • Always be ahead of vulnerabilities
  • Harden your website’s security
  • Login protection as essential security
  • Protect site visitors with Security Headers
  • Enable an efficient and performant firewall
Really Simple Plugins logo
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}