Beta

Report

Media Library Tools < 1.5.0 is vulnerable to Author+ Stored XSS via SVG vulnerability

Author
Published
2024-11-20

The Media File Rename, Find Unused File, Add Alt text, Caption, Desc For Image SEO – Media Library Tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

CVSS

Score:5.9

Severity:Medium

Version:< 1.5.0

There is a patch available in v1.5.0 and we strongly recommend you update to this version as soon as possible.