Skip to main content

CVE-2023-7086: CWE-79 Cross-Site Scripting (XSS) in Unknown SVG Uploads Support

Medium
VulnerabilityCVE-2023-7086cvecve-2023-7086cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:09:21 UTC)
Source: CVE
Vendor/Project: Unknown
Product: SVG Uploads Support

Description

The SVG Uploads Support WordPress plugin through 2.1.1 does not sanitize uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads.

AI-Powered Analysis

AILast updated: 07/04/2025, 15:57:42 UTC

Technical Analysis

CVE-2023-7086 is a medium-severity Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin 'SVG Uploads Support' up to version 2.1.1. The vulnerability arises because the plugin fails to properly sanitize uploaded SVG files, allowing users with as low a privilege as the Author role to upload malicious SVG files containing embedded XSS payloads. SVG files are XML-based vector graphics that can include script elements or event handlers, which if not sanitized, can execute arbitrary JavaScript in the context of the victim's browser. This vulnerability leverages CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 5.4, reflecting a medium severity with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. This means the attack can be performed remotely over the network with low attack complexity, requires privileges equivalent to an Author role, and user interaction is required to trigger the payload. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low, with no impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because WordPress is widely used, and SVG uploads are common for rich media content. An attacker exploiting this could execute malicious scripts in the context of users viewing the SVG, potentially leading to session hijacking, defacement, or further exploitation.

Potential Impact

For European organizations using WordPress sites with the SVG Uploads Support plugin, this vulnerability poses a risk of client-side attacks through XSS. Attackers with Author-level access (which may be granted to content creators or contributors) can upload malicious SVG files that execute scripts in the browsers of site visitors or administrators. This can lead to theft of authentication tokens, unauthorized actions performed on behalf of users, or delivery of further malware. The impact is particularly critical for organizations handling sensitive data or financial transactions via their websites, as compromised sessions could lead to data breaches or fraud. Additionally, organizations in regulated sectors such as finance, healthcare, or government may face compliance issues if such vulnerabilities are exploited. The requirement for user interaction to trigger the payload means social engineering or targeted phishing could be used to maximize impact. Since the scope is changed, the vulnerability could affect multiple components or users beyond the initial upload context, increasing the risk of widespread compromise within the affected web environment.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify if the SVG Uploads Support plugin is installed and determine the version in use. Until an official patch is released, organizations should consider disabling SVG uploads or restricting upload permissions strictly to trusted administrators rather than Authors or lower roles. Implementing a Web Application Firewall (WAF) with rules to detect and block malicious SVG content or suspicious script tags can provide a temporary protective layer. Additionally, sanitizing SVG files using third-party tools before upload can mitigate risk. Organizations should also review user roles and permissions to minimize the number of users with upload capabilities. Monitoring web server logs and user activity for unusual upload patterns or script execution attempts is recommended. Finally, stay alert for official patches or updates from the plugin vendor and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-12-22T19:54:37.570Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb92d

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 3:57:42 PM

Last updated: 7/28/2025, 7:34:36 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats