Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.1
Easy SVG Support plugin for WordPress can inject malicious code via SVG file uploads
CVE-2025-12451
Summary
The Easy SVG Support plugin for WordPress is not properly protecting against malicious code injected into SVG files uploaded to your site. This means an attacker with the right access can add code to these files that will run when users view them, potentially harming your site or stealing user data. Update to the latest version of the plugin to fix this issue.
Original title
The Easy SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file uploads in all versions up to, and including, 4.0 due to insufficient input sanitization and outp...
Original description
The Easy SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file uploads in all versions up to, and including, 4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
nvd CVSS3.1
6.1
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 19 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026