Input validation vulnerability in SVG Complete 1.0.2

The plugin called SVG Complete for WordPress has a security issue where hackers can insert harmful code into pages by uploading SVG files. This can happen in any version up to 1.0.2 because the plugin does not properly clean up the input or output. This means that attackers who have Author-level access or higher can add code that will run whenever someone opens the SVG file.

Detected in:

SVG Complete open vulnerable versions: >= * <= 1.0.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.