Description
The Basic Google Maps Placemarks plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 1.10.7. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to modify stored map latitude and longitude options.
Published: 2026-04-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of map coordinates
Action: Update plugin
AI Analysis

Impact

The Basic Google Maps Placemarks plugin for WordPress contains an authorization bypass flaw that allows unauthenticated users to alter stored latitude and longitude settings. This is caused by improper verification that a user has permission to perform the update action, and matches the improper authorization weakness identified as CWE-862. The flaw does not provide remote code execution or arbitrary file access, but it permits changes to configuration that could redirect map displays or mislead users.

Affected Systems

Affected systems include deployments of the iandunn Basic Google Maps Placemarks WordPress plugin, specifically all versions up to and including 1.10.7. Users running these versions are at risk of having their map coordinate configuration tampered with by unauthenticated actors if the plugin remains active.

Risk and Exploitability

The CVSS score for this vulnerability is 5.3, indicating a medium severity. No EPSS value is available and the vulnerability is not listed in the CISA KEV catalog. The attack requires network access to the WordPress site and the ability to authenticate to the plugin’s admin interface, which can be achieved by sending a crafted HTTP request to update the map settings. Because authentication is bypassed, an attacker does not need any credentials, so the risk is limited by the reach of the malicious request and the exposure of the site’s admin area.

Generated by OpenCVE AI on April 16, 2026 at 08:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Basic Google Maps Placemarks plugin to a version newer than 1.10.7 once it becomes available.
  • If an update cannot be applied immediately, temporarily disable or delete the plugin to prevent unauthorized configuration changes.
  • Restrict administrative access to trusted users and consider implementing IP whitelisting or two‑factor authentication for the WordPress admin area to reduce the likelihood of exploitation.

Generated by OpenCVE AI on April 16, 2026 at 08:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Iandunn
Iandunn basic Google Maps Placemarks
Wordpress
Wordpress wordpress
Vendors & Products Iandunn
Iandunn basic Google Maps Placemarks
Wordpress
Wordpress wordpress

Thu, 16 Apr 2026 05:45:00 +0000

Type Values Removed Values Added
Description The Basic Google Maps Placemarks plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 1.10.7. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to modify stored map latitude and longitude options.
Title Basic Google Maps Placemarks <= 1.10.7 - Missing Authorization to Unauthenticated Default Map Coordinate Update
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Iandunn Basic Google Maps Placemarks
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-16T13:44:00.613Z

Reserved: 2026-03-05T01:33:08.674Z

Link: CVE-2026-3581

cve-icon Vulnrichment

Updated: 2026-04-16T13:43:55.377Z

cve-icon NVD

Status : Received

Published: 2026-04-16T06:16:13.433

Modified: 2026-04-16T06:16:13.433

Link: CVE-2026-3581

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:11:42Z

Weaknesses