Mapplic and Mapplic Lite Plugins Vulnerable to Server-Side Request Forgery Attacks
CVE-2012-10018

8.3HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
16 October 2024

Summary

The Mapplic and Mapplic Lite plugins for WordPress exhibit a vulnerability that allows attackers to exploit Server-Side Request Forgery. This flaw occurs in versions up to and including 6.1 for Mapplic and up to version 1.0 for Mapplic Lite. By leveraging this vulnerability, an attacker can forge requests originating from a vulnerable site's server. If an SVG file is requested during this process, it may lead to Cross-Site Scripting (XSS) attacks. Users of these plugins are advised to update to the latest versions to mitigate potential threats.

Affected Version(s)

Mapplic - Custom Interactive Map WordPress Plugin * < 6.2

Mapplic Lite * < 1.0.1

References

CVSS V3.1

Score:
8.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Eagle Eye
.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.