Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13648: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in icopydoc Maps for WP

0
Medium
VulnerabilityCVE-2024-13648cvecve-2024-13648cwe-79
Published: Fri Feb 21 2025 (02/21/2025, 09:21:06 UTC)
Source: CVE Database V5
Vendor/Project: icopydoc
Product: Maps for WP

Description

CVE-2024-13648 is a stored cross-site scripting (XSS) vulnerability in the Maps for WP WordPress plugin, affecting all versions up to 1. 2. 4. It arises from improper input sanitization and output escaping in the 'MapOnePoint' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. No known exploits are reported in the wild yet. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:14:59 UTC

Technical Analysis

The Maps for WP plugin for WordPress contains a stored cross-site scripting (XSS) vulnerability identified as CVE-2024-13648. This vulnerability exists in the 'MapOnePoint' shortcode due to insufficient sanitization and escaping of user-supplied attributes. Authenticated attackers with contributor-level permissions or higher can inject arbitrary JavaScript code into pages using this shortcode. Because the malicious script is stored, it executes every time a user accesses the infected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability affects all versions up to and including 1.2.4 of the plugin. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, required privileges at the contributor level, no user interaction, and a scope change with low confidentiality and integrity impacts but no availability impact. No patches or fixes have been linked yet, and no active exploits are currently known. The vulnerability was published in February 2025 and assigned by Wordfence. This issue highlights the risks of insufficient input validation in WordPress plugins, especially those that allow user-generated content or shortcode attributes.

Potential Impact

The primary impact of this vulnerability is the potential for attackers with contributor-level access to inject persistent malicious scripts into WordPress sites using the Maps for WP plugin. This can lead to session hijacking, theft of sensitive user information such as cookies or credentials, unauthorized actions performed on behalf of users, defacement, or distribution of malware. Since the scripts execute in the context of the victim's browser, it can compromise the confidentiality and integrity of user data. Although the vulnerability does not affect availability, the reputational damage and potential data breaches can be significant. Organizations relying on this plugin for location mapping on their WordPress sites are at risk, especially if they allow contributor-level users or higher to add content. The scope of affected systems includes any WordPress site with the vulnerable plugin installed, which can be substantial given WordPress's widespread use. The requirement for authentication limits exploitation to insiders or compromised accounts, but this is often a realistic threat vector in multi-user environments.

Mitigation Recommendations

Since no official patch or update link is provided yet, organizations should implement immediate mitigations to reduce risk. First, restrict contributor-level and higher user permissions to trusted individuals only, minimizing the chance of malicious input. Disable or remove the Maps for WP plugin if it is not essential. If the plugin is required, consider temporarily disabling the 'MapOnePoint' shortcode or filtering its input using a Web Application Firewall (WAF) that can detect and block XSS payloads in shortcode attributes. Site administrators should monitor user-generated content for suspicious scripts and sanitize inputs manually if possible. Regularly audit user accounts and enforce strong authentication to prevent account compromise. Stay alert for official patches or updates from the vendor and apply them promptly once available. Additionally, implement Content Security Policy (CSP) headers to restrict script execution sources, which can mitigate the impact of injected scripts. Finally, educate content contributors about secure input practices and the risks of injecting untrusted code.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T14:50:12.463Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e64b7ef31ef0b59fdf8

Added to database: 2/25/2026, 9:49:24 PM

Last enriched: 2/25/2026, 11:14:59 PM

Last updated: 2/26/2026, 8:09:06 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats