CVE-2022-4022

Description

The SVG Support plugin for WordPress defaults to insecure settings in version 2.5 and 2.5.1. SVG files containing malicious javascript are not sanitized. While version 2.5 adds the ability to sanitize image as they are uploaded, the plugin defaults to disable sanitization and does not restrict SVG upload to only administrators. This allows authenticated attackers, with author-level privileges and higher, to upload malicious SVG files that can be embedded in posts and pages by higher privileged users. Additionally, the embedded JavaScript is also triggered on visiting the image URL, which allows an attacker to execute malicious code in browsers visiting that URL.

Category

6.4
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.11%
Third-Party Advisory wordpress.org Third-Party Advisory wordfence.com
Affected: benbodhi SVG Support
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-4022?
CVE-2022-4022 has been scored as a medium severity vulnerability.
How to fix CVE-2022-4022?
To fix CVE-2022-4022, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2022-4022 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-4022 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-4022?
CVE-2022-4022 affects benbodhi SVG Support.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.