Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bozdoz Leaflet Map leaflet-map allows Stored XSS.This issue affects Leaflet Map: from n/a through <= 3.4.4.
Published: 2026-04-08
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The flaw is a stored cross‑site scripting vulnerability that permits attackers to inject and store arbitrary JavaScript into pages rendered by the WordPress Leaflet Map plugin. The stored payload becomes part of the map content, causing browsers to execute the script when a user views the map. This can compromise the confidentiality, integrity, or availability of user data or the hosting web site by allowing malicious code to run in the victims' browsers.

Affected Systems

The vulnerability affects the WordPress Leaflet Map plugin provided by bozdoz. All versions up to and including 3.4.4 are impacted. Site administrators should verify which version of the plugin is deployed and whether any maps contain untrusted data.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through input fields or data entry points within the plugin where malicious payloads can be stored and later rendered to other visitors. Exploitation would typically require the ability to submit content to the plugin, so the risk is higher for accounts with content‑management privileges, and lower for anonymous users.

Generated by OpenCVE AI on April 9, 2026 at 17:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the currently installed version of the Leaflet Map plugin.
  • Update the plugin to version 3.4.5 or later, which contains the fix for the stored XSS issue.
  • After upgrading, confirm that the plugin’s input fields no longer accept unescaped JavaScript by testing with benign script payloads.
  • If an upgrade cannot be performed immediately, disable the plugin or remove any maps that contain untrusted data until a patch is applied.

Generated by OpenCVE AI on April 9, 2026 at 17:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Bozdoz
Bozdoz leaflet Map
Wordpress
Wordpress wordpress
Vendors & Products Bozdoz
Bozdoz leaflet Map
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bozdoz Leaflet Map leaflet-map allows Stored XSS.This issue affects Leaflet Map: from n/a through <= 3.4.4.
Title WordPress Leaflet Map plugin <= 3.4.4 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Bozdoz Leaflet Map
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-09T15:46:45.554Z

Reserved: 2026-04-07T10:57:48.107Z

Link: CVE-2026-39646

cve-icon Vulnrichment

Updated: 2026-04-09T15:46:29.331Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T09:16:35.483

Modified: 2026-04-24T18:06:24.707

Link: CVE-2026-39646

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:40:45Z

Weaknesses