Skip to main content

CVE-2023-6732: CWE-79 Cross-Site Scripting (XSS) in Unknown Ultimate Maps by Supsystic

Medium
VulnerabilityCVE-2023-6732cvecve-2023-6732cwe-79
Published: Tue Jan 16 2024 (01/16/2024, 15:57:02 UTC)
Source: CVE Database V5
Vendor/Project: Unknown
Product: Ultimate Maps by Supsystic

Description

The Ultimate Maps by Supsystic WordPress plugin before 1.2.16 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed

AI-Powered Analysis

AILast updated: 07/03/2025, 17:13:59 UTC

Technical Analysis

CVE-2023-6732 is a Cross-Site Scripting (XSS) vulnerability identified in the Ultimate Maps by Supsystic WordPress plugin versions prior to 1.2.16. This plugin allows WordPress site administrators to embed and customize maps on their websites. The vulnerability arises because certain plugin settings are not properly sanitized or escaped before being rendered in the web interface. Specifically, even when the WordPress unfiltered_html capability is disabled, high-privilege users such as administrators can inject malicious scripts via these settings. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation, leading to XSS. Exploitation requires administrative privileges and user interaction, as the malicious payload would execute in the context of an administrator's browser session. The CVSS v3.1 base score is 4.8 (medium severity), reflecting that the attack vector is network-based with low attack complexity, but requires high privileges and user interaction. The impact includes potential theft of sensitive information, session hijacking, or further privilege escalation within the WordPress environment. No public exploits are currently known in the wild, and no official patches or updates are linked in the provided data, though the issue is fixed in version 1.2.16 and later. The vulnerability affects the confidentiality and integrity of the affected WordPress sites but does not impact availability. The scope is limited to sites using this specific plugin and versions prior to 1.2.16, and the attack surface is constrained by the need for administrative access to inject malicious content.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to those using WordPress sites with the Ultimate Maps by Supsystic plugin. Given the plugin's function in embedding maps, it is likely used by businesses, local governments, and service providers that rely on geolocation features on their websites. Successful exploitation could lead to unauthorized script execution in admin sessions, potentially allowing attackers to steal credentials, manipulate site content, or pivot to other parts of the network. This could result in data breaches, reputational damage, and compliance issues under regulations such as GDPR, especially if personal data is exposed or manipulated. The requirement for administrative privileges limits the risk from external attackers but raises concerns about insider threats or compromised admin accounts. The vulnerability does not directly affect availability, so denial of service is unlikely. However, the integrity and confidentiality of website content and administrative control are at risk, which can indirectly impact business operations and trust.

Mitigation Recommendations

European organizations should take the following specific actions: 1) Immediately verify if the Ultimate Maps by Supsystic plugin is installed on any WordPress sites and identify the version in use. 2) Upgrade the plugin to version 1.2.16 or later, where the vulnerability is patched. 3) Restrict administrative access to trusted personnel only and enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of compromised admin accounts. 4) Conduct regular audits of WordPress plugins and themes to identify outdated or vulnerable components. 5) Implement Content Security Policy (CSP) headers to mitigate the impact of potential XSS attacks by restricting the execution of unauthorized scripts. 6) Monitor administrative activity logs for unusual behavior that could indicate exploitation attempts. 7) Educate administrators about the risks of injecting untrusted content into plugin settings and the importance of following secure configuration practices. These steps go beyond generic advice by focusing on plugin-specific patching, access control, and proactive monitoring tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-12-12T14:57:41.642Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dbfa6182aa0cae24982e5

Added to database: 6/2/2025, 3:13:42 PM

Last enriched: 7/3/2025, 5:13:59 PM

Last updated: 7/28/2025, 12:58:29 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats