Impact
The Pronamic Google Maps plugin contains a stored cross‑site scripting flaw that is triggered by inserting malicious code into the description field. Attackers who are authenticated with Contributor level or higher can inject arbitrary JavaScript that runs whenever a visitor views the page. The vulnerability is an instance of CWE‑79 and allows attackers to execute scripts in the context of site visitors, potentially leading to session hijacking, defacement, or redirection to malicious sites. The impact falls under confidentiality, integrity, and availability concerns for all users of the affected site.
Affected Systems
WordPress sites that have the Pronamic Google Maps plugin installed, any version up to and including 2.4.1. The flaw affects all installations of the plugin regardless of the WordPress version, as long as the contributor role privileges exist and can edit map descriptions.
Risk and Exploitability
With a CVSS score of 5.4 the flaw is considered moderate in severity, but the EPSS score of less than 1% indicates a low probability of exploitation in the wild. The vulnerability is not listed in CISA's KEV catalog, further suggesting limited real‑world impact so far. Exploitation requires authenticated access with at least Contributor level, so the threat comes from internal users or compromised contributor accounts. Internal privilege escalation or phishing that grants contributor rights could enable the injection. Although the risk is moderate, the presence of a stored XSS vector warrants a timely response.
OpenCVE Enrichment
EUVD