The Maps Widget for Google Maps for WordPress is vulnerable to Stored Cross-Site Scripting via widget settings in versions up to, and including, 4.24 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
References
Configurations
History
21 Nov 2024, 07:40
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.4 |
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2893821%40google-maps-widget%2Ftrunk&old=2876127%40google-maps-widget%2Ftrunk&sfp_email=&sfph_mail= - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/de871598-e4e7-49f6-8530-68243544c06c?source=cve - Third Party Advisory |
07 Nov 2023, 04:05
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2023-04-06 15:15
Updated : 2024-11-21 07:40
NVD link : CVE-2023-1913
Mitre link : CVE-2023-1913
CVE.ORG link : CVE-2023-1913
JSON object : View
Products Affected
webfactoryltd
- maps_widget_for_google_maps
CWE
No CWE.