Input validation vulnerability in SVG Block 1.1.24

The plugin called SVG Block for WordPress has a security issue that can be exploited by hackers. This is because the plugin does not properly clean up the input and output of SVG files uploaded through the REST API. This means that attackers who have high-level access can inject harmful code into pages that will run when a user opens the SVG file.

Detected in:

SVG Block fixed vulnerable versions: >= * <= 1.1.24

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.