MapSVG MapSVG Lite version 3.2.3 contains a Cross Site Request Forgery (CSRF) vulnerability in REST endpoint /wp-admin/admin-ajax.php?action=mapsvg_save that can result in an attacker can modify post data, including embedding javascript. This attack appears to be exploitable via the victim must be logged in to WordPress as an admin, and click a link. This vulnerability appears to have been fixed in 3.3.0 and later.
References
Link | Resource |
---|---|
https://advisories.dxw.com/advisories/csrf-mapsvg-lite/ | Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9198 | Exploit Third Party Advisory |
https://advisories.dxw.com/advisories/csrf-mapsvg-lite/ | Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9198 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://advisories.dxw.com/advisories/csrf-mapsvg-lite/ - Third Party Advisory | |
References | () https://wpvulndb.com/vulnerabilities/9198 - Exploit, Third Party Advisory |
Information
Published : 2019-02-04 21:29
Updated : 2024-11-21 04:17
NVD link : CVE-2019-1000003
Mitre link : CVE-2019-1000003
CVE.ORG link : CVE-2019-1000003
JSON object : View
Products Affected
mapsvg
- mapsvg_lite
CWE
CWE-352
Cross-Site Request Forgery (CSRF)