CVE-2024-13648: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in icopydoc Maps for WP
CVE-2024-13648 is a stored cross-site scripting (XSS) vulnerability in the Maps for WP WordPress plugin, affecting all versions up to 1. 2. 4. It arises from improper input sanitization and output escaping in the 'MapOnePoint' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. No known exploits are reported in the wild yet. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation.
AI Analysis
Technical Summary
The Maps for WP plugin for WordPress contains a stored cross-site scripting (XSS) vulnerability identified as CVE-2024-13648. This vulnerability exists in the 'MapOnePoint' shortcode due to insufficient sanitization and escaping of user-supplied attributes. Authenticated attackers with contributor-level permissions or higher can inject arbitrary JavaScript code into pages using this shortcode. Because the malicious script is stored, it executes every time a user accesses the infected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability affects all versions up to and including 1.2.4 of the plugin. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, required privileges at the contributor level, no user interaction, and a scope change with low confidentiality and integrity impacts but no availability impact. No patches or fixes have been linked yet, and no active exploits are currently known. The vulnerability was published in February 2025 and assigned by Wordfence. This issue highlights the risks of insufficient input validation in WordPress plugins, especially those that allow user-generated content or shortcode attributes.
Potential Impact
The primary impact of this vulnerability is the potential for attackers with contributor-level access to inject persistent malicious scripts into WordPress sites using the Maps for WP plugin. This can lead to session hijacking, theft of sensitive user information such as cookies or credentials, unauthorized actions performed on behalf of users, defacement, or distribution of malware. Since the scripts execute in the context of the victim's browser, it can compromise the confidentiality and integrity of user data. Although the vulnerability does not affect availability, the reputational damage and potential data breaches can be significant. Organizations relying on this plugin for location mapping on their WordPress sites are at risk, especially if they allow contributor-level users or higher to add content. The scope of affected systems includes any WordPress site with the vulnerable plugin installed, which can be substantial given WordPress's widespread use. The requirement for authentication limits exploitation to insiders or compromised accounts, but this is often a realistic threat vector in multi-user environments.
Mitigation Recommendations
Since no official patch or update link is provided yet, organizations should implement immediate mitigations to reduce risk. First, restrict contributor-level and higher user permissions to trusted individuals only, minimizing the chance of malicious input. Disable or remove the Maps for WP plugin if it is not essential. If the plugin is required, consider temporarily disabling the 'MapOnePoint' shortcode or filtering its input using a Web Application Firewall (WAF) that can detect and block XSS payloads in shortcode attributes. Site administrators should monitor user-generated content for suspicious scripts and sanitize inputs manually if possible. Regularly audit user accounts and enforce strong authentication to prevent account compromise. Stay alert for official patches or updates from the vendor and apply them promptly once available. Additionally, implement Content Security Policy (CSP) headers to restrict script execution sources, which can mitigate the impact of injected scripts. Finally, educate content contributors about secure input practices and the risks of injecting untrusted code.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2024-13648: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in icopydoc Maps for WP
Description
CVE-2024-13648 is a stored cross-site scripting (XSS) vulnerability in the Maps for WP WordPress plugin, affecting all versions up to 1. 2. 4. It arises from improper input sanitization and output escaping in the 'MapOnePoint' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. No known exploits are reported in the wild yet. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation.
AI-Powered Analysis
Technical Analysis
The Maps for WP plugin for WordPress contains a stored cross-site scripting (XSS) vulnerability identified as CVE-2024-13648. This vulnerability exists in the 'MapOnePoint' shortcode due to insufficient sanitization and escaping of user-supplied attributes. Authenticated attackers with contributor-level permissions or higher can inject arbitrary JavaScript code into pages using this shortcode. Because the malicious script is stored, it executes every time a user accesses the infected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability affects all versions up to and including 1.2.4 of the plugin. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, required privileges at the contributor level, no user interaction, and a scope change with low confidentiality and integrity impacts but no availability impact. No patches or fixes have been linked yet, and no active exploits are currently known. The vulnerability was published in February 2025 and assigned by Wordfence. This issue highlights the risks of insufficient input validation in WordPress plugins, especially those that allow user-generated content or shortcode attributes.
Potential Impact
The primary impact of this vulnerability is the potential for attackers with contributor-level access to inject persistent malicious scripts into WordPress sites using the Maps for WP plugin. This can lead to session hijacking, theft of sensitive user information such as cookies or credentials, unauthorized actions performed on behalf of users, defacement, or distribution of malware. Since the scripts execute in the context of the victim's browser, it can compromise the confidentiality and integrity of user data. Although the vulnerability does not affect availability, the reputational damage and potential data breaches can be significant. Organizations relying on this plugin for location mapping on their WordPress sites are at risk, especially if they allow contributor-level users or higher to add content. The scope of affected systems includes any WordPress site with the vulnerable plugin installed, which can be substantial given WordPress's widespread use. The requirement for authentication limits exploitation to insiders or compromised accounts, but this is often a realistic threat vector in multi-user environments.
Mitigation Recommendations
Since no official patch or update link is provided yet, organizations should implement immediate mitigations to reduce risk. First, restrict contributor-level and higher user permissions to trusted individuals only, minimizing the chance of malicious input. Disable or remove the Maps for WP plugin if it is not essential. If the plugin is required, consider temporarily disabling the 'MapOnePoint' shortcode or filtering its input using a Web Application Firewall (WAF) that can detect and block XSS payloads in shortcode attributes. Site administrators should monitor user-generated content for suspicious scripts and sanitize inputs manually if possible. Regularly audit user accounts and enforce strong authentication to prevent account compromise. Stay alert for official patches or updates from the vendor and apply them promptly once available. Additionally, implement Content Security Policy (CSP) headers to restrict script execution sources, which can mitigate the impact of injected scripts. Finally, educate content contributors about secure input practices and the risks of injecting untrusted code.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-23T14:50:12.463Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e64b7ef31ef0b59fdf8
Added to database: 2/25/2026, 9:49:24 PM
Last enriched: 2/25/2026, 11:14:59 PM
Last updated: 2/26/2026, 8:09:06 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.