cvelist/2024/4xxx/CVE-2024-4269.json

80 lines
2.3 KiB
JSON
Raw Normal View History

2024-04-26 20:01:05 +00:00
{
2024-07-13 06:00:35 +00:00
"data_version": "4.0",
2024-04-26 20:01:05 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-4269",
2024-07-13 06:00:35 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2024-04-26 20:01:05 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-07-13 06:00:35 +00:00
"value": "The SVG Block WordPress plugin before 1.1.20 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-Site Scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "SVG Block",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.1.20"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/8aae7aa1-6170-45d8-903f-8520913276da/",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/8aae7aa1-6170-45d8-903f-8520913276da/"
2024-04-26 20:01:05 +00:00
}
]
2024-07-13 06:00:35 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Rayhan Ramdhany Hanaputra"
},
{
"lang": "en",
"value": "WPScan"
}
]
2024-04-26 20:01:05 +00:00
}