Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1582: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpgmaps WP Go Maps (formerly WP Google Maps)

0
Medium
VulnerabilityCVE-2024-1582cvecve-2024-1582cwe-79
Published: Wed Mar 13 2024 (03/13/2024, 01:57:27 UTC)
Source: CVE Database V5
Vendor/Project: wpgmaps
Product: WP Go Maps (formerly WP Google Maps)

Description

CVE-2024-1582 is a stored cross-site scripting (XSS) vulnerability in the WP Go Maps WordPress plugin affecting all versions up to 9. 0. 32. Authenticated users with contributor-level or higher permissions can inject malicious scripts via the 'wpgmza' shortcode due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. The threat primarily affects WordPress sites globally, especially those with contributor-level user roles enabled.

AI-Powered Analysis

AILast updated: 02/26/2026, 09:42:13 UTC

Technical Analysis

CVE-2024-1582 is a stored cross-site scripting (XSS) vulnerability identified in the WP Go Maps plugin for WordPress, formerly known as WP Google Maps. This vulnerability arises from improper neutralization of user-supplied input in the 'wpgmza' shortcode, which is used to embed maps on WordPress pages. Specifically, the plugin fails to adequately sanitize and escape attributes provided by authenticated users with contributor-level or higher permissions. As a result, these users can inject arbitrary JavaScript code that is stored persistently in the website's content. When any user, including administrators or visitors, accesses a page containing the injected shortcode, the malicious script executes within their browser context. This can lead to a range of attacks such as session hijacking, privilege escalation, defacement, or distribution of malware. The vulnerability affects all versions of the plugin up to and including 9.0.32. The CVSS v3.1 base score is 6.4, reflecting a medium severity level, with an attack vector of network, low attack complexity, requiring privileges (contributor or higher), no user interaction, and a scope change due to the impact crossing privilege boundaries. Although no active exploits have been reported, the vulnerability poses a significant risk given the widespread use of WordPress and the plugin's popularity. The root cause is the lack of proper input validation and output encoding in the shortcode processing logic, which violates secure coding practices for web applications and leads to CWE-79 (Improper Neutralization of Input During Web Page Generation).

Potential Impact

The impact of CVE-2024-1582 is primarily on the confidentiality and integrity of affected WordPress sites. Successful exploitation allows authenticated users with contributor or higher roles to inject persistent malicious scripts that execute in the context of other users' browsers. This can lead to theft of session cookies, enabling attackers to impersonate administrators or other users, potentially resulting in full site compromise. Additionally, attackers can deface websites, redirect users to malicious sites, or deploy further client-side attacks such as malware distribution. While availability impact is minimal, the reputational damage and potential data breaches can be significant. Organizations relying on WP Go Maps for location services on their WordPress sites are at risk, especially if they allow contributor-level users or have weak user management policies. The vulnerability also increases the attack surface for phishing and social engineering campaigns targeting site users. Given WordPress's global market share and the plugin's popularity, the threat can affect a broad range of sectors including e-commerce, education, government, and media worldwide.

Mitigation Recommendations

To mitigate CVE-2024-1582, organizations should immediately update the WP Go Maps plugin to a version that addresses this vulnerability once available. In the absence of a patch, administrators should restrict contributor-level permissions and review user roles to limit who can add or edit content containing the 'wpgmza' shortcode. Implementing a Web Application Firewall (WAF) with rules to detect and block malicious script injections in shortcode attributes can provide temporary protection. Additionally, site owners should audit existing content for injected scripts and remove any suspicious entries. Enforcing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Developers maintaining the plugin should apply secure coding practices including rigorous input validation, output encoding, and use of WordPress security APIs for shortcode processing. Regular security scanning and monitoring for anomalous behavior related to shortcode usage are also recommended. Finally, educating content contributors about the risks of injecting untrusted code and enforcing strict content review workflows can reduce exploitation likelihood.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-02-16T14:24:24.389Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d35b7ef31ef0b56eff0

Added to database: 2/25/2026, 9:44:21 PM

Last enriched: 2/26/2026, 9:42:13 AM

Last updated: 2/26/2026, 9:43:49 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats