Description
The Extensions for Leaflet Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'elevation-track' shortcode in all versions up to, and including, 4.14. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-04-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via plugin shortcode
Action: Immediate Patch
AI Analysis

Impact

The Extensions for Leaflet Map WordPress plugin is vulnerable to stored cross‑site scripting because the 'elevation-track' shortcode does not properly sanitize or escape user‑supplied attributes. Authenticated users with Contributor or higher privileges can inject arbitrary JavaScript into the shortcode, which is then saved to the database. When any visitor loads a page containing the malicious shortcode, the injected script executes in the visitor's browser, allowing the attacker to steal credentials, hijack sessions, or perform unauthorized actions.

Affected Systems

Affected product is the Extensions for Leaflet Map plugin, version 4.14 or earlier, maintained by hupe13. The plugin is available through the official WordPress plugin repository and is used to embed Leaflet maps with elevation tracks on WordPress sites.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity. Because the flaw is exploitable via normal WordPress editing workflows—an attacker only needs Contributor role privileges to embed the malicious shortcode—the likelihood of exploitation is significant for sites that have upgraded or left the plugin at an affected version. EPSS data is unavailable and the vulnerability has not been reported in the CISA KEV catalog, but the potential impact and ease of exploitation warrant urgent remediation.

Generated by OpenCVE AI on April 8, 2026 at 21:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Extensions for Leaflet Map plugin to version 4.15 or later.
  • If an immediate update is not possible, deactivate or uninstall the plugin to prevent further exploitation.
  • After updating, review all posts, pages, and custom content for any elevation-track shortcodes containing malicious attributes and remove them.
  • Verify that only trusted users have Contributor or higher roles and restrict their ability to insert shortcodes if appropriate.

Generated by OpenCVE AI on April 8, 2026 at 21:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Hupe13
Hupe13 extensions For Leaflet Map
Wordpress
Wordpress wordpress
Vendors & Products Hupe13
Hupe13 extensions For Leaflet Map
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description The Extensions for Leaflet Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'elevation-track' shortcode in all versions up to, and including, 4.14. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Extensions for Leaflet Map <= 4.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'elevation-track' Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Hupe13 Extensions For Leaflet Map
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-09T17:53:32.804Z

Reserved: 2026-04-02T22:04:55.446Z

Link: CVE-2026-5451

cve-icon Vulnrichment

Updated: 2026-04-09T17:53:21.497Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T21:17:01.837

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-5451

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:27:21Z

Weaknesses