Description
The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple fields in versions up to, and including, 1.20.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-09-26
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored X‑SS (Contributor+).
Action: Update Plugin
AI Analysis

Impact

The Mapster WP Maps plugin for WordPress is vulnerable to stored cross‑site scripting in versions up to 1.20.0 because it fails to sanitize and escape user input in several admin fields. An authenticated attacker with contributor permissions or higher can inject arbitrary scripts that are then stored in the database and served because the plugin outputs the values without escaping. The injected scripts run in the browser context of anyone visiting the affected page, enabling session hijacking, content theft, or site defacement. The weakness is a classic input validation flaw (CWE‑79).

Affected Systems

WordPress sites that have the Mapster WP Maps plugin installed with a version equal to or older than 1.20.0 are affected. The plugin is provided by the vendor Mapster and is deployed as a WordPress plugin, so any site that installs it uses the vulnerable code path. No other products are listed as affected.

Risk and Exploitability

The vulnerability receives a CVSS score of 6.4, indicating moderate severity. The EPSS score is below 1 %, implying a very low probability of exploitation at the time of analysis, and it is not flagged in CISA’s KEV catalog. The attack requires an authenticated user with at least contributor privileges, so the risk is limited to sites with such roles available. If a user gains that access, the attacker can inject persistent scripts that execute on all subsequent page loads of visitors. The exploit path is straightforward: a contributor edits a map field, submits arbitrary JavaScript, and the plugin stores and later outputs it unescaped.

Generated by OpenCVE AI on April 20, 2026 at 19:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Mapster WP Maps to the latest available version (>= 1.21).
  • If an upgrade is not possible, disable or uninstall the plugin to eliminate the vulnerable code path.
  • Restrict contributor and higher roles from editing map fields, or remove unnecessary map features from the site’s configuration to limit the attack surface.

Generated by OpenCVE AI on April 20, 2026 at 19:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-31208 The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple fields in versions up to, and including, 1.20.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Fri, 26 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 26 Sep 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Mapster
Mapster mapster Wp Maps
Wordpress
Wordpress wordpress
Vendors & Products Mapster
Mapster mapster Wp Maps
Wordpress
Wordpress wordpress

Fri, 26 Sep 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple fields in versions up to, and including, 1.20.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Mapster WP Maps <= 1.20.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Mapster Mapster Wp Maps
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:16:05.449Z

Reserved: 2025-08-14T18:35:47.572Z

Link: CVE-2025-9044

cve-icon Vulnrichment

Updated: 2025-09-26T19:33:10.442Z

cve-icon NVD

Status : Deferred

Published: 2025-09-26T04:16:02.280

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T19:30:06Z

Weaknesses