CVE-2024-9069
Graphicsly – The ultimate graphics plugin for WordPress website builder ( Gutenberg, Elementor, Beaver Builder, WPBakery ) <= 1.0.2 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
The Graphicsly – The ultimate graphics plugin for WordPress website builder ( Gutenberg, Elementor, Beaver Builder, WPBakery ) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
| CWE | CWE-79 |
| Vendor | besnikac |
| Product | graphicsly – the ultimate graphics plugin for wordpress website builder ( gutenberg, elementor, beaver builder, wpbakery ) |
| Published | Sep 25, 2024 |
| Last Updated | Apr 8, 2026 |
Get instant alerts for besnikac graphicsly – the ultimate graphics plugin for wordpress website builder ( gutenberg, elementor, beaver builder, wpbakery )
Be the first to know when new medium vulnerabilities affecting besnikac graphicsly – the ultimate graphics plugin for wordpress website builder ( gutenberg, elementor, beaver builder, wpbakery ) are published — delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N