CVE-2025-11166: CWE-352 Cross-Site Request Forgery (CSRF) in wpgmaps WP Go Maps (formerly WP Google Maps)
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in all versions up to, and including, 9.0.46. This is due to the plugin exposing state-changing REST actions through an AJAX bridge without proper CSRF token validation, and having destructive logic reachable via GET requests with no permission_callback. This makes it possible for unauthenticated attackers to force logged-in administrators to create, update, or delete markers and geometry features via CSRF attacks, and allows anonymous users to trigger mass deletion of markers via unsafe GET requests.
AI Analysis
Technical Summary
The WP Go Maps plugin for WordPress, previously known as WP Google Maps, suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-11166. This vulnerability exists in all plugin versions up to and including 9.0.46. The root cause is the exposure of state-changing REST API actions through an AJAX bridge that lacks proper CSRF token validation, combined with destructive logic accessible via HTTP GET requests without any permission_callback checks. Consequently, an attacker can craft malicious web requests that, when visited by an authenticated administrator, can force unintended creation, modification, or deletion of map markers and geometry features. Moreover, the absence of permission checks on certain GET endpoints allows unauthenticated users to perform mass deletion of markers, severely impacting data integrity and availability. The vulnerability affects the confidentiality minimally but poses significant risks to integrity and availability of map data. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) indicates network attack vector, low attack complexity, no privileges required, user interaction needed, unchanged scope, no confidentiality impact, low integrity impact, and low availability impact. No patches were linked at the time of disclosure, and no active exploitation has been reported. The vulnerability is classified under CWE-352, emphasizing the lack of CSRF protections in web applications.
Potential Impact
This vulnerability can have serious consequences for organizations relying on WP Go Maps for location-based services on their WordPress sites. Attackers can manipulate map data by forcing administrators to unknowingly create, update, or delete markers, potentially misleading users or disrupting business operations. The ability for unauthenticated users to trigger mass deletion of markers can lead to significant data loss and service disruption, affecting user trust and operational continuity. Since WordPress powers a large portion of websites globally, and WP Go Maps is a popular plugin, the attack surface is broad. The integrity and availability of critical geospatial data can be compromised, which may impact businesses that depend on accurate mapping for logistics, customer engagement, or internal operations. Although confidentiality is not directly affected, the loss or alteration of map data can indirectly harm organizational reputation and user experience. The medium CVSS score reflects these moderate but tangible risks. Organizations without timely mitigation may face defacement, misinformation, or denial of service related to their map features.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the WP Go Maps plugin to a patched version once released by the vendor. Until a patch is available, administrators should restrict access to the WordPress admin interface to trusted IP addresses and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of CSRF exploitation. Implementing Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests lacking valid CSRF tokens can provide temporary protection. Site owners should audit and disable any unnecessary REST API endpoints exposed by the plugin, especially those allowing destructive actions via GET requests. Regular backups of map data should be maintained to enable quick restoration in case of data loss. Additionally, educating administrators about the risks of clicking on untrusted links while logged into WordPress can reduce the likelihood of successful CSRF attacks. Monitoring logs for unusual API activity related to map markers can help detect exploitation attempts early.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2025-11166: CWE-352 Cross-Site Request Forgery (CSRF) in wpgmaps WP Go Maps (formerly WP Google Maps)
Description
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in all versions up to, and including, 9.0.46. This is due to the plugin exposing state-changing REST actions through an AJAX bridge without proper CSRF token validation, and having destructive logic reachable via GET requests with no permission_callback. This makes it possible for unauthenticated attackers to force logged-in administrators to create, update, or delete markers and geometry features via CSRF attacks, and allows anonymous users to trigger mass deletion of markers via unsafe GET requests.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The WP Go Maps plugin for WordPress, previously known as WP Google Maps, suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-11166. This vulnerability exists in all plugin versions up to and including 9.0.46. The root cause is the exposure of state-changing REST API actions through an AJAX bridge that lacks proper CSRF token validation, combined with destructive logic accessible via HTTP GET requests without any permission_callback checks. Consequently, an attacker can craft malicious web requests that, when visited by an authenticated administrator, can force unintended creation, modification, or deletion of map markers and geometry features. Moreover, the absence of permission checks on certain GET endpoints allows unauthenticated users to perform mass deletion of markers, severely impacting data integrity and availability. The vulnerability affects the confidentiality minimally but poses significant risks to integrity and availability of map data. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) indicates network attack vector, low attack complexity, no privileges required, user interaction needed, unchanged scope, no confidentiality impact, low integrity impact, and low availability impact. No patches were linked at the time of disclosure, and no active exploitation has been reported. The vulnerability is classified under CWE-352, emphasizing the lack of CSRF protections in web applications.
Potential Impact
This vulnerability can have serious consequences for organizations relying on WP Go Maps for location-based services on their WordPress sites. Attackers can manipulate map data by forcing administrators to unknowingly create, update, or delete markers, potentially misleading users or disrupting business operations. The ability for unauthenticated users to trigger mass deletion of markers can lead to significant data loss and service disruption, affecting user trust and operational continuity. Since WordPress powers a large portion of websites globally, and WP Go Maps is a popular plugin, the attack surface is broad. The integrity and availability of critical geospatial data can be compromised, which may impact businesses that depend on accurate mapping for logistics, customer engagement, or internal operations. Although confidentiality is not directly affected, the loss or alteration of map data can indirectly harm organizational reputation and user experience. The medium CVSS score reflects these moderate but tangible risks. Organizations without timely mitigation may face defacement, misinformation, or denial of service related to their map features.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the WP Go Maps plugin to a patched version once released by the vendor. Until a patch is available, administrators should restrict access to the WordPress admin interface to trusted IP addresses and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of CSRF exploitation. Implementing Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests lacking valid CSRF tokens can provide temporary protection. Site owners should audit and disable any unnecessary REST API endpoints exposed by the plugin, especially those allowing destructive actions via GET requests. Regular backups of map data should be maintained to enable quick restoration in case of data loss. Additionally, educating administrators about the risks of clicking on untrusted links while logged into WordPress can reduce the likelihood of successful CSRF attacks. Monitoring logs for unusual API activity related to map markers can help detect exploitation attempts early.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-29T16:49:57.375Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e71ce832de7eb26af6c05d
Added to database: 10/9/2025, 2:24:40 AM
Last enriched: 2/27/2026, 6:48:33 PM
Last updated: 3/23/2026, 5:54:25 PM
Views: 157
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.