CVE-2024-8378

The Safe SVG WordPress plugin before 2.2.6 has its sanitisation code is only running for paths that call wp_handle_upload, but not for example for code that uses wp_handle_sideload which is often used to upload attachments via raw POST data.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:10up:safe_svg:*:*:*:*:*:wordpress:*:*

History

17 May 2025, 01:45

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://wpscan.com/vulnerability/17be4bf2-486d-43ab-b87a-2117c8d77ca8/ - () https://wpscan.com/vulnerability/17be4bf2-486d-43ab-b87a-2117c8d77ca8/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:10up:safe_svg:*:*:*:*:*:wordpress:*:*
First Time 10up safe Svg
10up

08 Nov 2024, 19:01

Type Values Removed Values Added
Summary
  • (es) El código de desinfección del complemento Safe SVG para WordPress anterior a la versión 2.2.6 solo se ejecuta para rutas que llaman a wp_handle_upload, pero no, por ejemplo, para el código que usa wp_handle_sideload, que a menudo se usa para cargar archivos adjuntos a través de datos POST sin procesar.

07 Nov 2024, 20:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 4.8

07 Nov 2024, 19:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4

07 Nov 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-07 16:15

Updated : 2025-05-17 01:45


NVD link : CVE-2024-8378

Mitre link : CVE-2024-8378

CVE.ORG link : CVE-2024-8378


JSON object : View

Products Affected

10up

  • safe_svg