Description
The SVG Map Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on multiple AJAX actions including 'save_data', 'delete_data', and 'add_popup'. This makes it possible for unauthenticated attackers to update the plugin's settings, delete map data, and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-01-07
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery allowing unauthorized settings changes and stored cross‑site scripting
Action: Patch
AI Analysis

Impact

The SVG Map Plugin for WordPress has a flaw where several AJAX operations such as 'save_data', 'delete_data', and 'add_popup' lack proper nonce verification. This defect permits unauthenticated attackers to perform actions on behalf of an administrator. By sending a forged request, an attacker may alter plugin settings, delete map data, or insert malicious scripts that are stored and rendered by the site. The weakness is a classic CSRF (CWE‑352) with potential for stored XSS if arbitrary scripts are submitted.

Affected Systems

The issue affects the WordPress plugin SVG Map by Smjrifle, versions up to and including 1.0.0. Sites running any version 1.0.0 or older are vulnerable.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, while the EPSS score being below 1% reflects a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it by tricking an administrator into clicking a crafted link or visiting a malicious site that submits a forged AJAX request. Because the flaw hinges solely on missing nonce validation, no technical barrier exists once an admin authorises the request, making the vector straightforward for social‑engineering attacks.

Generated by OpenCVE AI on April 21, 2026 at 16:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update SVG Map plugin to the latest version that addresses nonce validation.
  • If an update is not yet available, temporarily disable the plugin until a fix is released.
  • Limit administrative access to trusted IP addresses or implement two‑factor authentication to reduce potential for social‑engineering.

Generated by OpenCVE AI on April 21, 2026 at 16:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 07 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 08:30:00 +0000

Type Values Removed Values Added
Description The SVG Map Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on multiple AJAX actions including 'save_data', 'delete_data', and 'add_popup'. This makes it possible for unauthenticated attackers to update the plugin's settings, delete map data, and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title SVG Map Plugin <= 1.0.0 - Cross-Site Request Forgery to Settings Update and Stored Cross-Site Scripting
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:55:11.715Z

Reserved: 2025-11-21T19:11:08.471Z

Link: CVE-2025-13519

cve-icon Vulnrichment

Updated: 2026-01-07T14:47:16.412Z

cve-icon NVD

Status : Deferred

Published: 2026-01-07T12:16:48.473

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13519

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:00:12Z

Weaknesses