Description
The MapMap plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing or incorrect nonce validation on the admin_shortcode_submit, admin_configuration_submit, and admin_shortcode_delete functions. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-11-04
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of plugin settings and stored cross‑site scripting
Action: Apply patch
AI Analysis

Impact

The MapMap plugin for WordPress contains a vulnerable Cross‑Site Request Forgery flaw (CWE‑352) that allows unauthenticated attackers to forge requests to the plugin's admin endpoints. By bypassing nonce checks on the admin_shortcode_submit, admin_configuration_submit, and admin_shortcode_delete functions, an attacker can modify the plugin’s settings and inject arbitrary scripts that are stored in the database, leading to stored cross‑site scripting. This flaw can result in arbitrary configuration changes and the execution of malicious code within the context of authorized administrators, significantly compromising both confidentiality and integrity.

Affected Systems

All installations of the WordPress MapMap plugin version 1.1 and earlier, including the default “sugiartha:MapMap” plugin, are affected. Any WordPress site that currently runs these versions and has the plugin activated, especially where administrators have not applied mitigations, is vulnerable.

Risk and Exploitability

With a CVSS score of 6.1 this vulnerability is classified as moderate severity and is considered exploitable whenever an administrator can be persuaded to click a malicious link or submit a forged form. The EPSS score of less than 1% indicates a low probability of widespread exploitation, but the flaw remains uncovered in the CISA KEV catalog. Attackers would need to conduct social engineering against an admin, as the flaw is unauthenticated but requires the target to be logged in. Once exploited, the attacker can change plugin settings and inject stored scripts that run under the administrator context, potentially giving full control over the site’s front‑end.

Generated by OpenCVE AI on April 21, 2026 at 18:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the MapMap plugin to the latest version that contains the CSRF fixes
  • If an update is unavailable, deactivate or uninstall the plugin until a fixed version is released
  • Implement additional CSRF protection for admin actions, such as a security plugin that requires nonce validation on all post requests to the plugin or WordPress admin

Generated by OpenCVE AI on April 21, 2026 at 18:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 04 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 04:45:00 +0000

Type Values Removed Values Added
Description The MapMap plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing or incorrect nonce validation on the admin_shortcode_submit, admin_configuration_submit, and admin_shortcode_delete functions. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title MapMap <= 1.1 - Cross-Site Request Forgery to Settings Update and Stored Cross-Site Scripting
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:02:36.430Z

Reserved: 2025-10-28T15:42:03.979Z

Link: CVE-2025-12415

cve-icon Vulnrichment

Updated: 2025-11-04T15:52:57.272Z

cve-icon NVD

Status : Deferred

Published: 2025-11-04T05:16:13.530

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12415

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:45:06Z

Weaknesses