CVE-2025-13850: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ladislavsoukupgmailcom LS Google Map Router
The LS Google Map Router plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'map_type' parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-13850 is a stored Cross-Site Scripting (XSS) vulnerability identified in the LS Google Map Router plugin for WordPress, affecting all versions up to and including 1.1.0. The vulnerability stems from insufficient sanitization and escaping of user input in the 'map_type' parameter during web page generation. An attacker with authenticated Contributor-level access or higher can inject arbitrary JavaScript code into pages using this parameter. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing actions on behalf of the victim. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those allowing multiple contributors. The lack of available patches at the time of reporting necessitates immediate attention to mitigate risk. The vulnerability's exploitation can lead to partial confidentiality and integrity loss but does not affect availability. Given WordPress's popularity in Europe, this vulnerability could impact many organizations relying on this plugin for map routing functionality.
Potential Impact
For European organizations, the exploitation of CVE-2025-13850 could lead to unauthorized script execution within their WordPress sites, potentially resulting in session hijacking, data theft, defacement, or unauthorized actions performed on behalf of legitimate users. This can damage organizational reputation, lead to data breaches involving user information, and disrupt business operations relying on web presence. Since the vulnerability requires authenticated Contributor-level access, insider threats or compromised accounts pose a significant risk. Organizations with collaborative content management environments are particularly vulnerable. The medium severity score indicates moderate risk; however, the scope change means that the vulnerability can affect components beyond the initial vulnerable plugin, potentially impacting other site functionalities. Given the widespread use of WordPress in Europe, especially among SMEs and public sector websites, the threat could have broad implications if exploited at scale. The absence of known exploits currently provides a window for proactive mitigation, but the risk remains significant due to the ease of exploitation once access is obtained.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the LS Google Map Router plugin and verify its version. Since no official patches are currently available, organizations should consider temporarily disabling or removing the plugin to eliminate the attack vector. Restrict Contributor-level access strictly to trusted users and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of account compromise. Implement Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the 'map_type' parameter. Regularly monitor logs for suspicious activities related to plugin usage and user input. Educate content contributors about the risks of injecting untrusted content and enforce strict content validation policies. Once a patch is released, prioritize immediate deployment. Additionally, consider employing Content Security Policy (CSP) headers to limit the impact of potential script injections. Conduct periodic security assessments and vulnerability scans focusing on WordPress plugins to detect similar issues proactively.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-13850: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ladislavsoukupgmailcom LS Google Map Router
Description
The LS Google Map Router plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'map_type' parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-13850 is a stored Cross-Site Scripting (XSS) vulnerability identified in the LS Google Map Router plugin for WordPress, affecting all versions up to and including 1.1.0. The vulnerability stems from insufficient sanitization and escaping of user input in the 'map_type' parameter during web page generation. An attacker with authenticated Contributor-level access or higher can inject arbitrary JavaScript code into pages using this parameter. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing actions on behalf of the victim. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those allowing multiple contributors. The lack of available patches at the time of reporting necessitates immediate attention to mitigate risk. The vulnerability's exploitation can lead to partial confidentiality and integrity loss but does not affect availability. Given WordPress's popularity in Europe, this vulnerability could impact many organizations relying on this plugin for map routing functionality.
Potential Impact
For European organizations, the exploitation of CVE-2025-13850 could lead to unauthorized script execution within their WordPress sites, potentially resulting in session hijacking, data theft, defacement, or unauthorized actions performed on behalf of legitimate users. This can damage organizational reputation, lead to data breaches involving user information, and disrupt business operations relying on web presence. Since the vulnerability requires authenticated Contributor-level access, insider threats or compromised accounts pose a significant risk. Organizations with collaborative content management environments are particularly vulnerable. The medium severity score indicates moderate risk; however, the scope change means that the vulnerability can affect components beyond the initial vulnerable plugin, potentially impacting other site functionalities. Given the widespread use of WordPress in Europe, especially among SMEs and public sector websites, the threat could have broad implications if exploited at scale. The absence of known exploits currently provides a window for proactive mitigation, but the risk remains significant due to the ease of exploitation once access is obtained.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the LS Google Map Router plugin and verify its version. Since no official patches are currently available, organizations should consider temporarily disabling or removing the plugin to eliminate the attack vector. Restrict Contributor-level access strictly to trusted users and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of account compromise. Implement Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the 'map_type' parameter. Regularly monitor logs for suspicious activities related to plugin usage and user input. Educate content contributors about the risks of injecting untrusted content and enforce strict content validation policies. Once a patch is released, prioritize immediate deployment. Additionally, consider employing Content Security Policy (CSP) headers to limit the impact of potential script injections. Conduct periodic security assessments and vulnerability scans focusing on WordPress plugins to detect similar issues proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-01T19:55:39.821Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b9183650da22753edbb41
Added to database: 12/12/2025, 3:52:35 AM
Last enriched: 12/12/2025, 4:11:28 AM
Last updated: 12/15/2025, 4:15:02 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14698: Path Traversal in atlaszz AI Photo Team Galleryit App
MediumCVE-2025-14697: Files or Directories Accessible in Shenzhen Sixun Software Sixun Shanghui Group Business Management System
MediumCVE-2025-67907
UnknownCVE-2025-14702: Path Traversal in Smartbit CommV Smartschool App
MediumCVE-2025-13740: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in someguy9 Lightweight Accordion
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.