Description
Cross-Site Request Forgery (CSRF) vulnerability in ryan_xantoo Map Contact map-contact allows Stored XSS.This issue affects Map Contact: from n/a through <= 3.0.4.
Published: 2025-03-24
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Cross‑Site Request Forgery in the ryan_xantoo Map Contact plugin allows an attacker to store malicious JavaScript in the plugin’s data. When a visitor loads the contact map, the stored script is rendered, leading to arbitrary script execution in the victim’s browser. The weakness is identified as CWE‑352.

Affected Systems

WordPress sites that use the ryan_xantoo Map Contact plugin version 3.0.4 or earlier are affected. No other WordPress components are mentioned, so the impact is limited to installations that have not upgraded beyond 3.0.4.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity level. The EPSS score of less than 1 % suggests that exploitation is unlikely at present. The vulnerability is not listed in CISA’s KEV catalog, indicating no widespread public exploitation. The likely attack path is via a crafted HTTP request that bypasses CSRF checks, enabling the stored XSS to be activated when the map is viewed.

Generated by OpenCVE AI on May 1, 2026 at 13:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Map Contact plugin to a version newer than 3.0.4, if an update is available.
  • If no update exists, consider disabling or uninstalling the Map Contact plugin to eliminate the vulnerable code.
  • Implement server‑side CSRF token validation and sanitize any input before storing it, mitigating both CSRF and stored XSS components of the weakness.

Generated by OpenCVE AI on May 1, 2026 at 13:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7944 Cross-Site Request Forgery (CSRF) vulnerability in ryan_xantoo Map Contact allows Stored XSS. This issue affects Map Contact: from n/a through 3.0.4.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in ryan_xantoo Map Contact allows Stored XSS. This issue affects Map Contact: from n/a through 3.0.4. Cross-Site Request Forgery (CSRF) vulnerability in ryan_xantoo Map Contact map-contact allows Stored XSS.This issue affects Map Contact: from n/a through <= 3.0.4.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Tue, 25 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Mar 2025 14:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in ryan_xantoo Map Contact allows Stored XSS. This issue affects Map Contact: from n/a through 3.0.4.
Title WordPress Map Contact plugin <= 3.0.4 - CSRF to Stored XSS Vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:54.879Z

Reserved: 2025-03-24T13:00:24.106Z

Link: CVE-2025-30588

cve-icon Vulnrichment

Updated: 2025-03-25T17:49:05.997Z

cve-icon NVD

Status : Deferred

Published: 2025-03-24T14:15:31.057

Modified: 2026-04-23T15:26:55.397

Link: CVE-2025-30588

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T13:45:06Z

Weaknesses