CVE-2023-4460# Details
Title: Authenticated Reflected Cross-Site Scripting in <b>"Uploading SVG, WEBP and ICO files"</b> Plugin for WordPress CMS</br>
Date: 2023-08-10</br>
Author: Danilo Albuquerque</br>
Vendor Homepage: https://wordpress.org</br>
Software Link: https://wordpress.org/download</br>
Version: WordPress 6.3</br>
Plugin's Name and Version: Uploading SVG, WEBP and ICO files 1.2.1</br>
Tested on: Brave (Version 1.50.119 Chromium: 112.0.5615.121 (Official Version) 64 bits)</br>
# PoC for Reflected XSS vulnerability in Uploading SVG, WEBP and ICO files 1.2.1
1. Install the plugin;
2. Create a SVG file with the malicious payload within it;
3. Go to the "Media" page and upload the SVG file; and then
4. Access the file through URL.
When you do all that and update the current page, it will bring you the alert pop-up with the message in it.
## Screenshots below
1. No plugin PoC:

2. When there is no plugin the SVG file uploading does not work:

3. The plugin's version in this day:

4. The plugin is now installed and activated:

5. Created the SVG file with the malicious payload within it:

6. SVG file's upload done:

7. Payload triggered when the file is loaded:

# Bonus section: Stored XSS
1. Changed the content of the malicious file:

3. Got the POST request in my Collaborator oastify:

[4.0K] /data/pocs/32bba6f872c15fac406aaeefd980a5900529dbba
└── [2.5K] README.md
0 directories, 1 file