Description
The GmapsMania plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's gmap shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-05-02
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply patch
AI Analysis

Impact

The GmapsMania plugin for WordPress contains a stored cross‑site scripting flaw caused by insufficient sanitization and escaping of attributes supplied to the gmap shortcode. Attackers with authenticated contributor‑level access can insert arbitrary web scripts into the shortcode. Those scripts are written to the WordPress database and then rendered unescaped whenever a user views a page that contains the shortcode. The stored XSS permits the attacker to execute client‑side code in the browsers of any visitor to the affected page.

Affected Systems

All users of the garubi GmapsMania WordPress plugin running version 1.1 or earlier are affected. The flaw is resolved in releases newer than 1.1. Sites that have not yet applied the patch or have not upgraded to a later version remain vulnerable. The vulnerability requires the attacker to have at least Contributor role or higher to add or edit content containing the shortcode.

Risk and Exploitability

The CVSS score of 6.4 reflects a moderate severity. The EPSS score is below 1 %, indicating a very low current probability of exploitation. The flaw is not listed in the CISA KEV catalog. Because the attack vector requires authenticated contributor access, the initial exploitation is limited to users with sufficient privileges. However, once a payload is stored, every visitor to the affected page will have the script executed on their browser.

Generated by OpenCVE AI on April 28, 2026 at 02:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update GmapsMania to the latest version (≥ 1.2).
  • If an upgrade is not possible, remove or disable the gmap shortcode from all content to eliminate the vulnerability.
  • Restrict or revoke untrusted contributor privileges so that only trusted users can add or edit content containing shortcodes.

Generated by OpenCVE AI on April 28, 2026 at 02:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-12795 The GmapsMania plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's gmap shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Fri, 02 May 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 02 May 2025 02:30:00 +0000

Type Values Removed Values Added
Description The GmapsMania plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's gmap shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title GmapsMania <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:44:57.264Z

Reserved: 2025-04-30T08:54:32.422Z

Link: CVE-2025-4131

cve-icon Vulnrichment

Updated: 2025-05-02T16:29:09.832Z

cve-icon NVD

Status : Deferred

Published: 2025-05-02T03:15:21.257

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4131

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T02:15:18Z

Weaknesses