Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wpgmaps Wpgmaps wp Go Maps Wpgmaps wp Google Maps |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wpgmaps Wpgmaps wp Go Maps Wpgmaps wp Google Maps |
Thu, 09 Oct 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in all versions up to, and including, 9.0.46. This is due to the plugin exposing state-changing REST actions through an AJAX bridge without proper CSRF token validation, and having destructive logic reachable via GET requests with no permission_callback. This makes it possible for unauthenticated attackers to force logged-in administrators to create, update, or delete markers and geometry features via CSRF attacks, and allows anonymous users to trigger mass deletion of markers via unsafe GET requests. | |
| Title | WP Go Maps (formerly WP Google Maps) <= 9.0.46 - Cross-Site Request Forgery to Plugin Settings Update | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-10-09T18:10:57.000Z
Reserved: 2025-09-29T16:49:57.375Z
Link: CVE-2025-11166
Updated: 2025-10-09T18:10:51.974Z
Status : Awaiting Analysis
Published: 2025-10-09T02:15:41.213
Modified: 2025-10-09T15:50:04.013
Link: CVE-2025-11166
No data.
OpenCVE Enrichment
Updated: 2025-10-09T12:51:20Z