CVE-2023-6541

The Allow SVG WordPress plugin before 1.2.0 does not sanitize uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wphelpline:allow_svg:*:*:*:*:*:wordpress:*:*

History

11 Jun 2025, 19:22

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/bbe866b8-7497-4e5c-8f59-bb8edac1dc71/ - () https://wpscan.com/vulnerability/bbe866b8-7497-4e5c-8f59-bb8edac1dc71/ - Exploit, Third Party Advisory
CWE CWE-79
First Time Wphelpline
Wphelpline allow Svg
CPE cpe:2.3:a:wphelpline:allow_svg:*:*:*:*:*:wordpress:*:*

16 May 2025, 19:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

16 May 2025, 14:43

Type Values Removed Values Added
Summary
  • (es) El complemento Allow SVG de WordPress anterior a la versión 1.2.0 no depura los archivos SVG cargados, lo que podría permitir que los usuarios con un rol tan bajo como Autor carguen un SVG malicioso que contenga payloads XSS.

15 May 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-15 20:15

Updated : 2025-06-11 19:22


NVD link : CVE-2023-6541

Mitre link : CVE-2023-6541

CVE.ORG link : CVE-2023-6541


JSON object : View

Products Affected

wphelpline

  • allow_svg
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')