Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48078: Cross-Site Request Forgery (CSRF) in Norbert Slick Google Map

0
High
VulnerabilityCVE-2025-48078cvecve-2025-48078
Published: Thu Nov 06 2025 (11/06/2025, 15:53:37 UTC)
Source: CVE Database V5
Vendor/Project: Norbert
Product: Slick Google Map

Description

Cross-Site Request Forgery (CSRF) vulnerability in Norbert Slick Google Map slick-google-map allows Stored XSS.This issue affects Slick Google Map: from n/a through <= 0.3.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:50:27 UTC

Technical Analysis

CVE-2025-48078 identifies a critical security flaw in the Norbert Slick Google Map plugin, specifically versions up to 0.3. The vulnerability is a Cross-Site Request Forgery (CSRF) issue that enables attackers to trick authenticated users into submitting malicious requests without their consent. This CSRF flaw leads to Stored Cross-Site Scripting (XSS), where malicious scripts are permanently stored on the target web application, potentially affecting all users who access the compromised content. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H), allowing attackers to steal sensitive data, manipulate content, or disrupt service. The plugin’s lack of proper CSRF protections and insufficient input sanitization facilitates this exploit. Although no known exploits are currently in the wild and no patches have been released, the high CVSS score (8.8) reflects the severity and ease of exploitation. Organizations using this plugin in their web environments, especially those with public-facing sites, are vulnerable to targeted attacks that could lead to significant data breaches or service disruptions.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to web applications that integrate the Slick Google Map plugin. Exploitation could lead to unauthorized actions performed on behalf of users, data theft, defacement, or injection of malicious scripts that compromise user sessions and credentials. This could result in reputational damage, regulatory penalties under GDPR due to data breaches, and operational downtime. Organizations in sectors such as e-commerce, government, and critical infrastructure that rely on interactive maps for user engagement or service delivery are particularly vulnerable. The stored XSS aspect means that once exploited, the malicious payload can affect all visitors to the compromised site, amplifying the impact. The absence of patches increases the window of exposure, making proactive mitigation essential.

Mitigation Recommendations

Immediate mitigation should focus on disabling or removing the Slick Google Map plugin from production environments until a security patch is released. Web administrators should implement robust CSRF protections, including the use of anti-CSRF tokens for all state-changing requests. Input validation and output encoding must be enforced to prevent stored XSS payloads from being injected or executed. Web Application Firewalls (WAFs) can be configured to detect and block suspicious requests targeting the plugin’s endpoints. Regular security audits and monitoring for unusual user activity or injected scripts are recommended. Organizations should also maintain an inventory of web plugins and ensure timely updates. Engaging with the vendor or community to track patch releases and applying them promptly is critical. User education to recognize phishing attempts that could trigger CSRF attacks adds an additional layer of defense.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T17:53:58.199Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc7cdca26fb4dd2f57a80

Added to database: 11/6/2025, 4:07:41 PM

Last enriched: 1/20/2026, 7:50:27 PM

Last updated: 2/7/2026, 1:17:47 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats