Mapplic and Mapplic Lite Plugins Vulnerable to Server-Side Request Forgery Attacks
CVE-2012-10018
8.3HIGH
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 16 October 2024
Summary
The Mapplic and Mapplic Lite plugins for WordPress exhibit a vulnerability that allows attackers to exploit Server-Side Request Forgery. This flaw occurs in versions up to and including 6.1 for Mapplic and up to version 1.0 for Mapplic Lite. By leveraging this vulnerability, an attacker can forge requests originating from a vulnerable site's server. If an SVG file is requested during this process, it may lead to Cross-Site Scripting (XSS) attacks. Users of these plugins are advised to update to the latest versions to mitigate potential threats.
Affected Version(s)
Mapplic - Custom Interactive Map WordPress Plugin * < 6.2
Mapplic Lite * < 1.0.1
References
CVSS V3.1
Score:
8.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Eagle Eye