Input validation vulnerability in SVG Support 2.5.10

The plugin for WordPress that supports SVG files is not secure and can be vulnerable to attacks. This is because it does not properly clean or protect the input and output of the files. As a result, someone with authorization, such as an administrator or author, could inject malicious code into pages that will run whenever the SVG file is accessed. Although this vulnerability is only exploitable by administrators by default, it can be extended to authors as well.

Detected in:

SVG Support open vulnerable versions: >= * <= 2.5.10

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.