Input validation vulnerability in WP SVG Images 4.2

The WP SVG Images plugin for WordPress has a security issue that allows attackers to inject harmful code into web pages. This can be done by manipulating the ‘type’ parameter in the plugin, which has not been properly checked for safety. This means that attackers who have a certain level of access to WordPress can upload files that appear safe, but actually contain malicious code. This code will then be executed whenever a user visits the affected web page.

Detected in:

WP SVG Images fixed vulnerable versions: >= * <= 4.3

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.