Stored Cross-Site Scripting Vulnerability Affects OpenStreetMap Plugin for WordPress
CVE-2024-11827

6.4MEDIUM

Key Information:

Vendor

Wordpress

Vendor
CVE Published:
13 December 2024

What is CVE-2024-11827?

The OpenStreetMap plugin for WordPress is exposed to a stored cross-site scripting vulnerability, allowing authenticated users with contributor-level access or higher to inject malicious scripts. This issue arises from the plugin's insufficient input sanitization and output escaping processes, particularly concerning the ootb_query shortcode. Attackers can craft payloads that execute arbitrary web scripts on pages accessed by users, potentially leading to severe security breaches. Administrators of sites utilizing this plugin should prioritize updating to a secure version and implementing additional input validation measures.

Affected Version(s)

Out of the Block: OpenStreetMap * <= 2.8.3

References

CVSS V3.1

Score:
6.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Peter Thaleikis
.