CVE-2019-1000003

MapSVG MapSVG Lite version 3.2.3 contains a Cross Site Request Forgery (CSRF) vulnerability in REST endpoint /wp-admin/admin-ajax.php?action=mapsvg_save that can result in an attacker can modify post data, including embedding javascript. This attack appears to be exploitable via the victim must be logged in to WordPress as an admin, and click a link. This vulnerability appears to have been fixed in 3.3.0 and later.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:mapsvg:mapsvg_lite:3.2.3:*:*:*:*:*:*:*

History

21 Nov 2024, 04:17

Type Values Removed Values Added
References () https://advisories.dxw.com/advisories/csrf-mapsvg-lite/ - Third Party Advisory () https://advisories.dxw.com/advisories/csrf-mapsvg-lite/ - Third Party Advisory
References () https://wpvulndb.com/vulnerabilities/9198 - Exploit, Third Party Advisory () https://wpvulndb.com/vulnerabilities/9198 - Exploit, Third Party Advisory

Information

Published : 2019-02-04 21:29

Updated : 2024-11-21 04:17


NVD link : CVE-2019-1000003

Mitre link : CVE-2019-1000003

CVE.ORG link : CVE-2019-1000003


JSON object : View

Products Affected

mapsvg

  • mapsvg_lite
CWE
CWE-352

Cross-Site Request Forgery (CSRF)