CVE-2022-1091
Summary
| CVE | CVE-2022-1091 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-04-18 18:15:00 UTC |
| Updated | 2022-04-27 12:35:00 UTC |
| Description | The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks). |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Attention Required! | Cloudflare | MISC | wpscan.com | |
| Better checking of the file type when determining which files are SVGs by dkotter · Pull Request #28 · 10up/safe-svg · GitHub | CONFIRM | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: David Hamann
There are currently no legacy QID mappings associated with this CVE.