WP Go Maps (formerly WP Google Maps) Vulnerability – Authenticated (Contributor+) Stored Cross-Site Scripting – CVE-2024-5994 | WordPress Plugin Vulnerability Report
Plugin Name:WP Go Maps (formerly WP Google Maps)
Key Information:
- Software Type: Plugin
- Software Slug: wp-google-maps
- Software Status: Active
- Software Author: wpgmaps
- Software Downloads: 23,828,563
- Active Installs: 300,000
- Last Updated: July 2, 2024
- Patched Versions: 9.0.39
- Affected Versions: <= 9.0.38
Vulnerability Details:
- Name: WP Go Maps (formerly WP Google Maps) <= 9.0.38
- Title: Authenticated (Contributor+) Stored Cross-Site Scripting
- Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
- CVE: CVE-2024-5994
- CVSS Score: 6.4
- Publicly Published: June 13, 2024
- Researcher: Tim Coen
- Description: The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom JS option in versions up to, and including, 9.0.38. This makes it possible for authenticated attackers with contributor-level permissions and above, who have been explicitly granted permissions by an administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Version 9.0.39 adds a caution to make administrators aware of the possibility for abuse if permissions are granted to lower-level users.
Summary:
The WP Go Maps (formerly WP Google Maps) plugin for WordPress has a vulnerability in versions up to and including 9.0.38 that allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability has been patched in version 9.0.39.
Detailed Overview:
The vulnerability in the WP Go Maps (formerly WP Google Maps) plugin, identified by researcher Tim Coen, is located in the Custom JS option. This flaw is due to insufficient input sanitization and output escaping, allowing authenticated attackers with contributor-level access and above to inject arbitrary web scripts. These scripts will execute whenever a user accesses a page containing the injected scripts. The risks of this vulnerability include the potential for attackers to perform actions on behalf of other users, access sensitive information, and compromise site integrity. The vulnerability has been addressed in version 9.0.39, which includes an additional caution to make administrators aware of the possibility for abuse if permissions are granted to lower-level users.
Advice for Users:
- Immediate Action: Users are strongly encouraged to update to the patched version 9.0.39 immediately to mitigate the vulnerability.
- Check for Signs of Vulnerability: Users should check their websites for any unexpected or suspicious scripts and review user accounts for unauthorized changes.
- Alternate Plugins: While a patch is available, users might consider using alternate plugins that offer similar functionality as a precaution.
- Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities.
Conclusion:
The prompt response from the plugin developers to patch this vulnerability underscores the importance of timely updates. Users are advised to ensure that they are running version 9.0.39 or later to secure their WordPress installations.
References:
Detailed Report:
In the rapidly evolving landscape of website management, keeping your WordPress site secure is of utmost importance. Regularly updating your plugins is a crucial part of maintaining this security. Recently, a significant vulnerability was discovered in the WP Go Maps (formerly WP Google Maps) plugin, a popular tool used by many to integrate interactive maps into their WordPress sites. This vulnerability, identified as CVE-2024-5994, poses a serious risk to websites using versions up to and including 9.0.38.
The vulnerability allows authenticated attackers with contributor-level access to exploit the Custom JS option, injecting arbitrary web scripts that execute whenever a user accesses the compromised page. This flaw, due to insufficient input sanitization and output escaping, can lead to unauthorized actions, access to sensitive information, and compromised site integrity.
For website owners, particularly small business owners who may not have the resources to constantly monitor for such vulnerabilities, this highlights the necessity of staying updated and vigilant. This article will provide a comprehensive overview of the vulnerability, its potential impacts, and actionable steps to safeguard your site. Ensuring your site is secure not only protects your business but also preserves the trust of your users.
Plugin Details
WP Go Maps (formerly WP Google Maps) is a widely used WordPress plugin that allows users to integrate interactive maps into their websites. This plugin has seen over 23 million downloads and boasts 300,000 active installs. It is actively maintained by its author, wpgmaps, and was last updated on July 2, 2024. The latest version, 9.0.39, includes a crucial security patch addressing the recent vulnerability.