First published: Fri Jun 09 2023(Updated: )
The Easy Google Maps plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.11.7. This is due to missing or incorrect nonce validation on the AJAX action handler. This makes it possible for unauthenticated attackers to executes AJAX actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Easy Google Maps | <=1.11.7 |
https://plugins.trac.wordpress.org/browser/google-maps-easy/trunk/classes/frame.php?rev=2777743#L246
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2526 is a vulnerability in the Easy Google Maps plugin for WordPress that allows unauthenticated attackers to execute AJAX actions via a forged request, due to missing or incorrect nonce validation.
The severity of CVE-2023-2526 is medium with a CVSS score of 5.4.
CVE-2023-2526 affects versions up to and including 1.11.7 of the Easy Google Maps plugin for WordPress.
To fix CVE-2023-2526, it is recommended to update the Easy Google Maps plugin for WordPress to a version higher than 1.11.7, where the nonce validation issue is fixed.
More information about CVE-2023-2526 can be found at the following references: [Reference 1](https://plugins.trac.wordpress.org/browser/google-maps-easy/trunk/classes/frame.php?rev=2777743#L246), [Reference 2](https://plugins.trac.wordpress.org/changeset/2916430/), [Reference 3](https://plugins.trac.wordpress.org/changeset/2916430/google-maps-easy/trunk/classes/frame.php?contextall=1).