First published: Sat Feb 15 2025(Updated: )
The Maps Plugin using Google Maps for WordPress WordPress plugin before 1.9.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Themeisle Google Maps Plugin | <1.9.4 | |
WP Google Maps | <1.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13306 has a high severity rating due to its potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-13306, update the Google Maps Plugin for WordPress to version 1.9.4 or later.
CVE-2024-13306 affects users of the Google Maps Plugin for WordPress and the WP Google Maps plugin prior to version 1.9.4.
CVE-2024-13306 is a Stored Cross-Site Scripting vulnerability that arises from inadequate sanitization and escaping of plugin settings.
Yes, high privilege users such as admins can exploit CVE-2024-13306 to execute Stored Cross-Site Scripting attacks.