Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2021-39346
Analyzed
More InfoOfficial Page
Source-security@wordfence.com
View Known Exploited Vulnerability (KEV) details
Published At-01 Nov, 2021 | 21:15
Updated At-02 Nov, 2021 | 19:58

The Google Maps Easy WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/modules/marker_groups/views/tpl/mgrEditMarkerGroup.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.9.33. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.8MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Primary2.02.1LOW
AV:N/AC:H/Au:S/C:N/I:P/A:N
CPE Matches

supsystic
supsystic
>>easy_google_maps>>Versions up to 1.9.33(inclusive)
cpe:2.3:a:supsystic:easy_google_maps:*:*:*:*:*:wordpress:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarysecurity@wordfence.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/BigTiger2020/word-press/blob/main/Google%20Maps%20Easy.mdsecurity@wordfence.com
Exploit
Third Party Advisory
https://plugins.trac.wordpress.org/changeset/2620851/google-maps-easy/trunk/modules/marker_groups/views/tpl/mgrEditMarkerGroup.phpsecurity@wordfence.com
Patch
Third Party Advisory
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39346security@wordfence.com
Third Party Advisory
Change History
0Changes found

Details not found