Impact
The pagup:WP Google Street View (with 360° virtual tour) & Google maps + Local SEO plugin for WordPress contains a stored cross‑site scripting vulnerability that allows an authenticated attacker with contributor or higher privileges to inject arbitrary JavaScript into the 'wpgsv_map' shortcode. The injected script is stored in the database and is executed whenever any user views a page or post containing the affected shortcode.
Affected Systems
All WordPress sites running the pagup:WP Google Street View (with 360° virtual tour) & Google maps + Local SEO plugin up to and including version 1.1.8 are affected. The vulnerability manifests when a page or post uses the 'wpgsv_map' shortcode within these versions; sites that do not use the plugin or shortcode are not impacted.
Risk and Exploitability
The CVSS score of 6.4 classifies the issue as medium severity, while the EPSS score of less than 1% indicates a low probability of automated exploitation. The vulnerability requires authenticated contributor‑level access or higher to inject scripts, and it is not currently listed in the CISA KEV catalog, which suggests no widely documented exploitation at this time.
OpenCVE Enrichment