CVE-2025-12163
Description
The Omnipress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Omnipress WordPress plugin (≤1.6.5) allows authenticated authors to upload SVG files with stored XSS due to insufficient sanitization.
Vulnerability
Overview
The Omnipress plugin for WordPress, in all versions up to and including 1.6.5, contains a Stored Cross-Site Scripting (XSS) vulnerability arising from insufficient input sanitization and output escaping during SVG file uploads [1]. This flaw falls under CWE-434 (Unrestricted Upload of File with Dangerous Type), as the plugin fails to properly validate or sanitize SVG files, which can contain embedded JavaScript [1][2].
Exploitation
Prerequisites
An attacker must be authenticated with at least Author-level access to the WordPress site. The attacker can then upload a malicious SVG file containing arbitrary web scripts. When any user (including administrators or visitors) accesses the uploaded SVG file, the injected script executes in the context of the victim's browser [1]. No additional privileges or network position are required beyond the authenticated session.
Impact
Successful exploitation allows the attacker to inject arbitrary JavaScript or other web scripts into pages viewed by other users. This can lead to session hijacking, defacement, redirection to malicious sites, or theft of sensitive information such as cookies or authentication tokens. The stored nature of the XSS means the payload persists until the malicious file is removed [1].
Mitigation
As of the publication date, no patched version has been released. Users are advised to restrict SVG upload capabilities for Author-level users or disable SVG uploads entirely until an update is available. The vendor has not yet provided a fix [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<=1.6.5+ 1 more
- (no CPE)range: <=1.6.5
- (no CPE)range: <=1.6.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- cwe.mitre.org/data/definitions/434.htmlnvd
- owasp.org/www-community/vulnerabilities/Unrestricted_File_Uploadnvd
- plugins.trac.wordpress.org/browser/omnipress/tags/1.6.3/includes/Core/RestControllersBase.phpnvd
- plugins.trac.wordpress.org/browser/omnipress/tags/1.6.3/includes/RestApi/Controllers/V1/FileUploadRestController.phpnvd
- plugins.trac.wordpress.org/browser/omnipress/tags/1.6.3/includes/uploader/FileUploader.phpnvd
- plugins.trac.wordpress.org/browser/omnipress/tags/1.6.3/includes/uploader/FileUploader.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/15aabe3b-1b77-4e4e-9710-cf06924dbcbfnvd
News mentions
0No linked articles in our index yet.