Version Description
- Fairly big new feature - The library now allows
<use>
elements as long as they don't reference external files! - You can now also embed safe image types within the SVG and not have them stripped (PNG, GIF, JPG)
Download this release
Release Info
Developer | enshrined |
Plugin | Safe SVG |
Version | 1.6.0 |
Comparing to | |
See all releases |
Code changes from version 1.5.3 to 1.6.0
- lib/composer.lock +5 -5
- lib/vendor/composer/installed.json +6 -6
- lib/vendor/enshrined/svg-sanitize/.travis.yml +1 -1
- lib/vendor/enshrined/svg-sanitize/src/Sanitizer.php +75 -12
- lib/vendor/enshrined/svg-sanitize/src/data/AllowedTags.php +2 -2
- lib/vendor/enshrined/svg-sanitize/tests/SanitizerTest.php +15 -0
- lib/vendor/enshrined/svg-sanitize/tests/data/externalClean.svg +4 -1
- lib/vendor/enshrined/svg-sanitize/tests/data/externalTest.svg +4 -1
- lib/vendor/enshrined/svg-sanitize/tests/data/useClean.svg +4 -0
- lib/vendor/enshrined/svg-sanitize/tests/data/useTest.svg +5 -0
- readme.txt +6 -2
- safe-svg.php +1 -1
lib/composer.lock
CHANGED
@@ -9,16 +9,16 @@
|
|
9 |
"packages": [
|
10 |
{
|
11 |
"name": "enshrined/svg-sanitize",
|
12 |
-
"version": "0.
|
13 |
"source": {
|
14 |
"type": "git",
|
15 |
"url": "https://github.com/darylldoyle/svg-sanitizer.git",
|
16 |
-
"reference": "
|
17 |
},
|
18 |
"dist": {
|
19 |
"type": "zip",
|
20 |
-
"url": "https://api.github.com/repos/darylldoyle/svg-sanitizer/zipball/
|
21 |
-
"reference": "
|
22 |
"shasum": ""
|
23 |
},
|
24 |
"require-dev": {
|
@@ -42,7 +42,7 @@
|
|
42 |
}
|
43 |
],
|
44 |
"description": "An SVG sanitizer for PHP",
|
45 |
-
"time": "2017-06
|
46 |
}
|
47 |
],
|
48 |
"packages-dev": [],
|
9 |
"packages": [
|
10 |
{
|
11 |
"name": "enshrined/svg-sanitize",
|
12 |
+
"version": "0.8.2",
|
13 |
"source": {
|
14 |
"type": "git",
|
15 |
"url": "https://github.com/darylldoyle/svg-sanitizer.git",
|
16 |
+
"reference": "432fc4fc7e95b8a866790ba27e35076b9dd96ebe"
|
17 |
},
|
18 |
"dist": {
|
19 |
"type": "zip",
|
20 |
+
"url": "https://api.github.com/repos/darylldoyle/svg-sanitizer/zipball/432fc4fc7e95b8a866790ba27e35076b9dd96ebe",
|
21 |
+
"reference": "432fc4fc7e95b8a866790ba27e35076b9dd96ebe",
|
22 |
"shasum": ""
|
23 |
},
|
24 |
"require-dev": {
|
42 |
}
|
43 |
],
|
44 |
"description": "An SVG sanitizer for PHP",
|
45 |
+
"time": "2017-12-06 15:31:26"
|
46 |
}
|
47 |
],
|
48 |
"packages-dev": [],
|
lib/vendor/composer/installed.json
CHANGED
@@ -1,24 +1,24 @@
|
|
1 |
[
|
2 |
{
|
3 |
"name": "enshrined/svg-sanitize",
|
4 |
-
"version": "0.
|
5 |
-
"version_normalized": "0.
|
6 |
"source": {
|
7 |
"type": "git",
|
8 |
"url": "https://github.com/darylldoyle/svg-sanitizer.git",
|
9 |
-
"reference": "
|
10 |
},
|
11 |
"dist": {
|
12 |
"type": "zip",
|
13 |
-
"url": "https://api.github.com/repos/darylldoyle/svg-sanitizer/zipball/
|
14 |
-
"reference": "
|
15 |
"shasum": ""
|
16 |
},
|
17 |
"require-dev": {
|
18 |
"codeclimate/php-test-reporter": "^0.1.2",
|
19 |
"phpunit/phpunit": "^4.7"
|
20 |
},
|
21 |
-
"time": "2017-06
|
22 |
"type": "library",
|
23 |
"installation-source": "dist",
|
24 |
"autoload": {
|
1 |
[
|
2 |
{
|
3 |
"name": "enshrined/svg-sanitize",
|
4 |
+
"version": "0.8.2",
|
5 |
+
"version_normalized": "0.8.2.0",
|
6 |
"source": {
|
7 |
"type": "git",
|
8 |
"url": "https://github.com/darylldoyle/svg-sanitizer.git",
|
9 |
+
"reference": "432fc4fc7e95b8a866790ba27e35076b9dd96ebe"
|
10 |
},
|
11 |
"dist": {
|
12 |
"type": "zip",
|
13 |
+
"url": "https://api.github.com/repos/darylldoyle/svg-sanitizer/zipball/432fc4fc7e95b8a866790ba27e35076b9dd96ebe",
|
14 |
+
"reference": "432fc4fc7e95b8a866790ba27e35076b9dd96ebe",
|
15 |
"shasum": ""
|
16 |
},
|
17 |
"require-dev": {
|
18 |
"codeclimate/php-test-reporter": "^0.1.2",
|
19 |
"phpunit/phpunit": "^4.7"
|
20 |
},
|
21 |
+
"time": "2017-12-06 15:31:26",
|
22 |
"type": "library",
|
23 |
"installation-source": "dist",
|
24 |
"autoload": {
|
lib/vendor/enshrined/svg-sanitize/.travis.yml
CHANGED
@@ -1,10 +1,10 @@
|
|
1 |
language: php
|
2 |
php:
|
3 |
-
- 5.3
|
4 |
- 5.4
|
5 |
- 5.5
|
6 |
- 5.6
|
7 |
- 7.0
|
|
|
8 |
|
9 |
before_script:
|
10 |
- composer install --dev
|
1 |
language: php
|
2 |
php:
|
|
|
3 |
- 5.4
|
4 |
- 5.5
|
5 |
- 5.6
|
6 |
- 7.0
|
7 |
+
- 7.1
|
8 |
|
9 |
before_script:
|
10 |
- composer install --dev
|
lib/vendor/enshrined/svg-sanitize/src/Sanitizer.php
CHANGED
@@ -23,11 +23,6 @@ class Sanitizer
|
|
23 |
*/
|
24 |
const SCRIPT_REGEX = '/(?:\w+script|data):/xi';
|
25 |
|
26 |
-
/**
|
27 |
-
* Regex to test for remote URLs in linked assets
|
28 |
-
*/
|
29 |
-
const REMOTE_REFERENCE_REGEX = '/url\(([\'"]?(?:http|https):)[\'"]?([^\'"\)]*)[\'"]?\)/xi';
|
30 |
-
|
31 |
/**
|
32 |
* @var DOMDocument
|
33 |
*/
|
@@ -58,6 +53,11 @@ class Sanitizer
|
|
58 |
*/
|
59 |
protected $removeRemoteReferences = false;
|
60 |
|
|
|
|
|
|
|
|
|
|
|
61 |
/**
|
62 |
*
|
63 |
*/
|
@@ -171,7 +171,11 @@ class Sanitizer
|
|
171 |
$this->startClean($allElements);
|
172 |
|
173 |
// Save cleaned XML to a variable
|
174 |
-
|
|
|
|
|
|
|
|
|
175 |
|
176 |
$this->resetAfter();
|
177 |
|
@@ -245,6 +249,13 @@ class Sanitizer
|
|
245 |
$this->cleanXlinkHrefs($currentElement);
|
246 |
|
247 |
$this->cleanHrefs($currentElement);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
248 |
}
|
249 |
}
|
250 |
|
@@ -283,7 +294,15 @@ class Sanitizer
|
|
283 |
{
|
284 |
$xlinks = $element->getAttributeNS('http://www.w3.org/1999/xlink', 'href');
|
285 |
if (preg_match(self::SCRIPT_REGEX, $xlinks) === 1) {
|
286 |
-
$
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
287 |
}
|
288 |
}
|
289 |
|
@@ -300,15 +319,34 @@ class Sanitizer
|
|
300 |
}
|
301 |
}
|
302 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
303 |
/**
|
304 |
* Does this attribute value have a remote reference?
|
305 |
*
|
306 |
* @param $value
|
307 |
* @return bool
|
308 |
*/
|
309 |
-
protected function hasRemoteReference($value)
|
310 |
-
|
311 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
312 |
return true;
|
313 |
}
|
314 |
|
@@ -326,7 +364,17 @@ class Sanitizer
|
|
326 |
}
|
327 |
|
328 |
/**
|
329 |
-
*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
330 |
*
|
331 |
* @param $attributeName
|
332 |
*
|
@@ -344,7 +392,7 @@ class Sanitizer
|
|
344 |
}
|
345 |
|
346 |
/**
|
347 |
-
* Check to see if an
|
348 |
*
|
349 |
* @param $attributeName
|
350 |
*
|
@@ -360,4 +408,19 @@ class Sanitizer
|
|
360 |
|
361 |
return false;
|
362 |
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
363 |
}
|
23 |
*/
|
24 |
const SCRIPT_REGEX = '/(?:\w+script|data):/xi';
|
25 |
|
|
|
|
|
|
|
|
|
|
|
26 |
/**
|
27 |
* @var DOMDocument
|
28 |
*/
|
53 |
*/
|
54 |
protected $removeRemoteReferences = false;
|
55 |
|
56 |
+
/**
|
57 |
+
* @var bool
|
58 |
+
*/
|
59 |
+
protected $removeXMLTag = false;
|
60 |
+
|
61 |
/**
|
62 |
*
|
63 |
*/
|
171 |
$this->startClean($allElements);
|
172 |
|
173 |
// Save cleaned XML to a variable
|
174 |
+
if($this->removeXMLTag) {
|
175 |
+
$clean = $this->xmlDocument->saveXML($this->xmlDocument->documentElement, LIBXML_NOEMPTYTAG);
|
176 |
+
} else {
|
177 |
+
$clean = $this->xmlDocument->saveXML($this->xmlDocument, LIBXML_NOEMPTYTAG);
|
178 |
+
}
|
179 |
|
180 |
$this->resetAfter();
|
181 |
|
249 |
$this->cleanXlinkHrefs($currentElement);
|
250 |
|
251 |
$this->cleanHrefs($currentElement);
|
252 |
+
|
253 |
+
if(strtolower($currentElement->tagName) === 'use') {
|
254 |
+
if($this->isUseTagDirty($currentElement)) {
|
255 |
+
$currentElement->parentNode->removeChild($currentElement);
|
256 |
+
continue;
|
257 |
+
}
|
258 |
+
}
|
259 |
}
|
260 |
}
|
261 |
|
294 |
{
|
295 |
$xlinks = $element->getAttributeNS('http://www.w3.org/1999/xlink', 'href');
|
296 |
if (preg_match(self::SCRIPT_REGEX, $xlinks) === 1) {
|
297 |
+
if(! in_array(substr($xlinks, 0, 14), array(
|
298 |
+
'data:image/png', // PNG
|
299 |
+
'data:image/gif', // GIF
|
300 |
+
'data:image/jpg', // JPG
|
301 |
+
'data:image/jpe', // JPEG
|
302 |
+
'data:image/pjp', // PJPEG
|
303 |
+
))) {
|
304 |
+
$element->removeAttributeNS( 'http://www.w3.org/1999/xlink', 'href' );
|
305 |
+
}
|
306 |
}
|
307 |
}
|
308 |
|
319 |
}
|
320 |
}
|
321 |
|
322 |
+
/**
|
323 |
+
* Removes non-printable ASCII characters from string & trims it
|
324 |
+
*
|
325 |
+
* @param string $value
|
326 |
+
* @return bool
|
327 |
+
*/
|
328 |
+
protected function removeNonPrintableCharacters($value)
|
329 |
+
{
|
330 |
+
return trim(preg_replace('/[^ -~]/xu','',$value));
|
331 |
+
}
|
332 |
+
|
333 |
/**
|
334 |
* Does this attribute value have a remote reference?
|
335 |
*
|
336 |
* @param $value
|
337 |
* @return bool
|
338 |
*/
|
339 |
+
protected function hasRemoteReference($value){
|
340 |
+
$value = $this->removeNonPrintableCharacters($value);
|
341 |
+
|
342 |
+
$wrapped_in_url = preg_match('~^url\(\s*[\'"]\s*(.*)\s*[\'"]\s*\)$~xi', $value, $match);
|
343 |
+
if (!$wrapped_in_url){
|
344 |
+
return false;
|
345 |
+
}
|
346 |
+
|
347 |
+
$value = trim($match[1], '\'"');
|
348 |
+
|
349 |
+
if (preg_match('~^((https?|ftp|file):)?//~xi', $value)){
|
350 |
return true;
|
351 |
}
|
352 |
|
364 |
}
|
365 |
|
366 |
/**
|
367 |
+
* Should we remove the XML tag in the header?
|
368 |
+
*
|
369 |
+
* @param bool $removeXMLTag
|
370 |
+
*/
|
371 |
+
public function removeXMLTag ($removeXMLTag = false)
|
372 |
+
{
|
373 |
+
$this->removeXMLTag = (bool) $removeXMLTag;
|
374 |
+
}
|
375 |
+
|
376 |
+
/**
|
377 |
+
* Check to see if an attribute is an aria attribute or not
|
378 |
*
|
379 |
* @param $attributeName
|
380 |
*
|
392 |
}
|
393 |
|
394 |
/**
|
395 |
+
* Check to see if an attribute is an data attribute or not
|
396 |
*
|
397 |
* @param $attributeName
|
398 |
*
|
408 |
|
409 |
return false;
|
410 |
}
|
411 |
+
|
412 |
+
/**
|
413 |
+
* Make sure our use tag is only referencing internal resources
|
414 |
+
*
|
415 |
+
* @param \DOMElement $element
|
416 |
+
* @return bool
|
417 |
+
*/
|
418 |
+
protected function isUseTagDirty(\DOMElement $element) {
|
419 |
+
$xlinks = $element->getAttributeNS('http://www.w3.org/1999/xlink', 'href');
|
420 |
+
if ($xlinks && substr($xlinks, 0, 1) !== '#') {
|
421 |
+
return true;
|
422 |
+
}
|
423 |
+
|
424 |
+
return false;
|
425 |
+
}
|
426 |
}
|
lib/vendor/enshrined/svg-sanitize/src/data/AllowedTags.php
CHANGED
@@ -27,7 +27,7 @@ class AllowedTags implements TagInterface
|
|
27 |
'datalist','dd','decorator','del','details','dfn','dir','div','dl','dt',
|
28 |
'element','em','fieldset','figcaption','figure','font','footer','form',
|
29 |
'h1','h2','h3','h4','h5','h6','head','header','hgroup','hr','html','i',
|
30 |
-
'img','input','ins','kbd','label','legend','li','main','map','mark',
|
31 |
'marquee','menu','menuitem','meter','nav','nobr','ol','optgroup',
|
32 |
'option','output','p','pre','progress','q','rp','rt','ruby','s','samp',
|
33 |
'section','select','shadow','small','source','spacer','span','strike',
|
@@ -41,7 +41,7 @@ class AllowedTags implements TagInterface
|
|
41 |
'ellipse','filter','font','g','glyph','glyphref','hkern','image','line',
|
42 |
'lineargradient','marker','mask','metadata','mpath','path','pattern',
|
43 |
'polygon','polyline','radialgradient','rect','stop','switch','symbol',
|
44 |
-
'text','textpath','title','tref','tspan','view','vkern',
|
45 |
|
46 |
// SVG Filters
|
47 |
'feblend','fecolormatrix','fecomponenttransfer','fecomposite',
|
27 |
'datalist','dd','decorator','del','details','dfn','dir','div','dl','dt',
|
28 |
'element','em','fieldset','figcaption','figure','font','footer','form',
|
29 |
'h1','h2','h3','h4','h5','h6','head','header','hgroup','hr','html','i',
|
30 |
+
'image','img','input','ins','kbd','label','legend','li','main','map','mark',
|
31 |
'marquee','menu','menuitem','meter','nav','nobr','ol','optgroup',
|
32 |
'option','output','p','pre','progress','q','rp','rt','ruby','s','samp',
|
33 |
'section','select','shadow','small','source','spacer','span','strike',
|
41 |
'ellipse','filter','font','g','glyph','glyphref','hkern','image','line',
|
42 |
'lineargradient','marker','mask','metadata','mpath','path','pattern',
|
43 |
'polygon','polyline','radialgradient','rect','stop','switch','symbol',
|
44 |
+
'text','textpath','title','tref','tspan','view','vkern', 'use',
|
45 |
|
46 |
// SVG Filters
|
47 |
'feblend','fecolormatrix','fecomponenttransfer','fecomposite',
|
lib/vendor/enshrined/svg-sanitize/tests/SanitizerTest.php
CHANGED
@@ -163,4 +163,19 @@ class SanitizerTest extends PHPUnit_Framework_TestCase
|
|
163 |
|
164 |
$this->assertXmlStringEqualsXmlString($expected, $cleanData);
|
165 |
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
166 |
}
|
163 |
|
164 |
$this->assertXmlStringEqualsXmlString($expected, $cleanData);
|
165 |
}
|
166 |
+
|
167 |
+
/**
|
168 |
+
* Test that ARIA and Data Attributes are allowed
|
169 |
+
*/
|
170 |
+
public function testThatExternalUseElementsAreStripped()
|
171 |
+
{
|
172 |
+
$initialData = file_get_contents('tests/data/useTest.svg');
|
173 |
+
$expected = file_get_contents('tests/data/useClean.svg');
|
174 |
+
|
175 |
+
$this->class->minify(false);
|
176 |
+
$cleanData = $this->class->sanitize($initialData);
|
177 |
+
$this->class->minify(false);
|
178 |
+
|
179 |
+
$this->assertXmlStringEqualsXmlString($expected, $cleanData);
|
180 |
+
}
|
181 |
}
|
lib/vendor/enshrined/svg-sanitize/tests/data/externalClean.svg
CHANGED
@@ -2,6 +2,9 @@
|
|
2 |
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xml:space="preserve">
|
3 |
<rect x="0" y="0" width="1000" height="1000"></rect>
|
4 |
<rect x="0" y="0" width="1000" height="1000"></rect>
|
|
|
|
|
|
|
5 |
<rect fill="url('/benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
6 |
<rect fill="url('#benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
7 |
-
</svg>
|
2 |
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xml:space="preserve">
|
3 |
<rect x="0" y="0" width="1000" height="1000"></rect>
|
4 |
<rect x="0" y="0" width="1000" height="1000"></rect>
|
5 |
+
<rect x="0" y="0" width="1000" height="1000"></rect>
|
6 |
+
<rect x="0" y="0" width="1000" height="1000"></rect>
|
7 |
+
<rect x="0" y="0" width="1000" height="1000"></rect>
|
8 |
<rect fill="url('/benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
9 |
<rect fill="url('#benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
10 |
+
</svg>
|
lib/vendor/enshrined/svg-sanitize/tests/data/externalTest.svg
CHANGED
@@ -3,6 +3,9 @@
|
|
3 |
<svg version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xml:space="preserve">
|
4 |
<rect fill="url('http://example.com/benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
5 |
<rect fill="url('https://example.com/benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
|
|
|
|
|
|
6 |
<rect fill="url('/benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
7 |
<rect fill="url('#benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
8 |
-
</svg>
|
3 |
<svg version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xml:space="preserve">
|
4 |
<rect fill="url('http://example.com/benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
5 |
<rect fill="url('https://example.com/benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
6 |
+
<rect fill=" url( ' https://example.com/benis.svg ' ) " x="0" y="0" width="1000" height="1000"></rect>
|
7 |
+
<rect fill="url('ftp://192.168.2.1/benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
8 |
+
<rect fill="url('//example.com/benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
9 |
<rect fill="url('/benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
10 |
<rect fill="url('#benis.svg')" x="0" y="0" width="1000" height="1000"></rect>
|
11 |
+
</svg>
|
lib/vendor/enshrined/svg-sanitize/tests/data/useClean.svg
ADDED
@@ -0,0 +1,4 @@
|
|
|
|
|
|
|
|
|
1 |
+
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 68 65">
|
2 |
+
<use xlink:href="#a" x="28" fill="#1A374D"/>
|
3 |
+
<path id="a" d="M14 27v-20c0-3.7-3.3-7-7-7s-7 3.3-7 7v41c0 8.2 9.2 17 20 17s20-9.2 20-20c0-13.3-13.4-21.8-26-18zm6 25c-4 0-7-3-7-7s3-7 7-7 7 3 7 7-3 7-7 7z"/>
|
4 |
+
</svg>
|
lib/vendor/enshrined/svg-sanitize/tests/data/useTest.svg
ADDED
@@ -0,0 +1,5 @@
|
|
|
|
|
|
|
|
|
|
|
1 |
+
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 68 65">
|
2 |
+
<use xlink:href="#a" x="28" fill="#1A374D"/>
|
3 |
+
<path id="a" d="M14 27v-20c0-3.7-3.3-7-7-7s-7 3.3-7 7v41c0 8.2 9.2 17 20 17s20-9.2 20-20c0-13.3-13.4-21.8-26-18zm6 25c-4 0-7-3-7-7s3-7 7-7 7 3 7 7-3 7-7 7z"/>
|
4 |
+
<use xlink:href="defs.svg#icon-1"/>
|
5 |
+
</svg>
|
readme.txt
CHANGED
@@ -3,8 +3,8 @@ Contributors: enshrined
|
|
3 |
Donate link: https://wpsvg.com/
|
4 |
Tags: svg, sanitize, upload, sanitise, security, svg upload, image, vector, file, graphic, media, mime
|
5 |
Requires at least: 4.0
|
6 |
-
Tested up to: 4.9.
|
7 |
-
Stable tag: 1.
|
8 |
License: GPLv2 or later
|
9 |
License URI: http://www.gnu.org/licenses/gpl-2.0.html
|
10 |
|
@@ -39,6 +39,10 @@ Install through the WordPress directory or download, unzip and upload the files
|
|
39 |
|
40 |
== Changelog ==
|
41 |
|
|
|
|
|
|
|
|
|
42 |
= 1.5.3 =
|
43 |
* 1.5.2 introduced an issue that can freeze the media library. This fixes that issue. Sorry!
|
44 |
|
3 |
Donate link: https://wpsvg.com/
|
4 |
Tags: svg, sanitize, upload, sanitise, security, svg upload, image, vector, file, graphic, media, mime
|
5 |
Requires at least: 4.0
|
6 |
+
Tested up to: 4.9.1
|
7 |
+
Stable tag: 1.6.0
|
8 |
License: GPLv2 or later
|
9 |
License URI: http://www.gnu.org/licenses/gpl-2.0.html
|
10 |
|
39 |
|
40 |
== Changelog ==
|
41 |
|
42 |
+
= 1.6.0 =
|
43 |
+
* Fairly big new feature - The library now allows `<use>` elements as long as they don't reference external files!
|
44 |
+
* You can now also embed safe image types within the SVG and not have them stripped (PNG, GIF, JPG)
|
45 |
+
|
46 |
= 1.5.3 =
|
47 |
* 1.5.2 introduced an issue that can freeze the media library. This fixes that issue. Sorry!
|
48 |
|
safe-svg.php
CHANGED
@@ -3,7 +3,7 @@
|
|
3 |
Plugin Name: Safe SVG
|
4 |
Plugin URI: https://wpsvg.com/
|
5 |
Description: Allows SVG uploads into WordPress and sanitizes the SVG before saving it
|
6 |
-
Version: 1.
|
7 |
Author: Daryll Doyle
|
8 |
Author URI: http://enshrined.co.uk
|
9 |
Text Domain: safe-svg
|
3 |
Plugin Name: Safe SVG
|
4 |
Plugin URI: https://wpsvg.com/
|
5 |
Description: Allows SVG uploads into WordPress and sanitizes the SVG before saving it
|
6 |
+
Version: 1.6.0
|
7 |
Author: Daryll Doyle
|
8 |
Author URI: http://enshrined.co.uk
|
9 |
Text Domain: safe-svg
|