MapSVG MapSVG Lite version 3.2.3 contains a Cross Site Request Forgery (CSRF) vulnerability in REST endpoint /wp-admin/admin-ajax.php?action=mapsvg_save that can result in an attacker can modify post data, including embedding javascript. This attack appears to be exploitable via the victim must be logged in to WordPress as an admin, and click a link. This vulnerability appears to have been fixed in 3.3.0 and later.
References
Link | Resource |
---|---|
https://advisories.dxw.com/advisories/csrf-mapsvg-lite/ | Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9198 | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-02-04 13:29
Updated : 2019-02-15 11:40
NVD link : CVE-2019-1000003
Mitre link : CVE-2019-1000003
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
mapsvg
- mapsvg_lite