CVE-2025-62942: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tempranova WP Mapbox GL JS Maps
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tempranova WP Mapbox GL JS Maps wp-mapbox-gl-js allows Stored XSS.This issue affects WP Mapbox GL JS Maps: from n/a through <= 3.0.1.
AI Analysis
Technical Summary
CVE-2025-62942 is a stored Cross-site Scripting (XSS) vulnerability identified in the WP Mapbox GL JS Maps plugin for WordPress, specifically affecting versions up to and including 3.0.1. The vulnerability stems from improper neutralization of input during web page generation, which allows an attacker with low privileges (PR:L) to inject malicious scripts that are stored and later executed in the context of users who visit the affected pages. The attack vector is network-based (AV:N), requiring user interaction (UI:R), and the vulnerability impacts confidentiality and integrity (C:L/I:L) but not availability. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the stored XSS nature means that attackers can embed persistent malicious payloads, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. The vulnerability is particularly relevant for websites that utilize the WP Mapbox GL JS Maps plugin to display interactive maps, as malicious input could be injected into map-related content or parameters. The CVSS v3.1 base score of 5.4 classifies this as a medium severity issue, reflecting the balance between ease of exploitation and the impact on affected systems. The vulnerability was published on October 27, 2025, and no official patches or mitigations have been linked yet, emphasizing the need for vigilance and proactive defense measures.
Potential Impact
For European organizations, the impact of CVE-2025-62942 can be significant, especially for those relying on WordPress websites with interactive map features powered by the WP Mapbox GL JS Maps plugin. Successful exploitation could lead to the compromise of user accounts, theft of sensitive session tokens, and unauthorized actions performed under the guise of legitimate users, undermining trust and potentially leading to data breaches. Public-facing websites of government agencies, transportation services, tourism boards, and businesses that provide location-based services are particularly at risk. The vulnerability could also facilitate further attacks such as phishing or malware distribution by injecting malicious scripts into trusted websites. Although the vulnerability does not directly affect system availability, the reputational damage and potential regulatory consequences under GDPR for data breaches involving personal data could be substantial. The requirement for low privileges and user interaction lowers the barrier for exploitation, increasing the likelihood of targeted attacks against European entities that use this plugin.
Mitigation Recommendations
1. Monitor the WP Mapbox GL JS Maps plugin repository and vendor announcements closely for official patches addressing CVE-2025-62942 and apply updates immediately upon release. 2. Until patches are available, restrict plugin usage to trusted users and limit the ability to input or modify map-related content to administrators only. 3. Implement strict input validation and output encoding on all user-supplied data related to map features to prevent injection of malicious scripts. 4. Deploy Content Security Policies (CSP) that restrict the execution of inline scripts and only allow scripts from trusted sources to reduce the impact of potential XSS payloads. 5. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including stored XSS, especially on pages that render map content. 6. Educate site administrators and users about the risks of clicking on suspicious links or interacting with untrusted content on affected websites. 7. Employ Web Application Firewalls (WAF) with rules designed to detect and block common XSS attack patterns targeting WordPress plugins. 8. Review and harden WordPress user roles and permissions to minimize the number of users who can inject or modify content that could be exploited.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-62942: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tempranova WP Mapbox GL JS Maps
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tempranova WP Mapbox GL JS Maps wp-mapbox-gl-js allows Stored XSS.This issue affects WP Mapbox GL JS Maps: from n/a through <= 3.0.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-62942 is a stored Cross-site Scripting (XSS) vulnerability identified in the WP Mapbox GL JS Maps plugin for WordPress, specifically affecting versions up to and including 3.0.1. The vulnerability stems from improper neutralization of input during web page generation, which allows an attacker with low privileges (PR:L) to inject malicious scripts that are stored and later executed in the context of users who visit the affected pages. The attack vector is network-based (AV:N), requiring user interaction (UI:R), and the vulnerability impacts confidentiality and integrity (C:L/I:L) but not availability. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the stored XSS nature means that attackers can embed persistent malicious payloads, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. The vulnerability is particularly relevant for websites that utilize the WP Mapbox GL JS Maps plugin to display interactive maps, as malicious input could be injected into map-related content or parameters. The CVSS v3.1 base score of 5.4 classifies this as a medium severity issue, reflecting the balance between ease of exploitation and the impact on affected systems. The vulnerability was published on October 27, 2025, and no official patches or mitigations have been linked yet, emphasizing the need for vigilance and proactive defense measures.
Potential Impact
For European organizations, the impact of CVE-2025-62942 can be significant, especially for those relying on WordPress websites with interactive map features powered by the WP Mapbox GL JS Maps plugin. Successful exploitation could lead to the compromise of user accounts, theft of sensitive session tokens, and unauthorized actions performed under the guise of legitimate users, undermining trust and potentially leading to data breaches. Public-facing websites of government agencies, transportation services, tourism boards, and businesses that provide location-based services are particularly at risk. The vulnerability could also facilitate further attacks such as phishing or malware distribution by injecting malicious scripts into trusted websites. Although the vulnerability does not directly affect system availability, the reputational damage and potential regulatory consequences under GDPR for data breaches involving personal data could be substantial. The requirement for low privileges and user interaction lowers the barrier for exploitation, increasing the likelihood of targeted attacks against European entities that use this plugin.
Mitigation Recommendations
1. Monitor the WP Mapbox GL JS Maps plugin repository and vendor announcements closely for official patches addressing CVE-2025-62942 and apply updates immediately upon release. 2. Until patches are available, restrict plugin usage to trusted users and limit the ability to input or modify map-related content to administrators only. 3. Implement strict input validation and output encoding on all user-supplied data related to map features to prevent injection of malicious scripts. 4. Deploy Content Security Policies (CSP) that restrict the execution of inline scripts and only allow scripts from trusted sources to reduce the impact of potential XSS payloads. 5. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including stored XSS, especially on pages that render map content. 6. Educate site administrators and users about the risks of clicking on suspicious links or interacting with untrusted content on affected websites. 7. Employ Web Application Firewalls (WAF) with rules designed to detect and block common XSS attack patterns targeting WordPress plugins. 8. Review and harden WordPress user roles and permissions to minimize the number of users who can inject or modify content that could be exploited.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-24T14:24:48.653Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68fed03223a7bbed324acc1d
Added to database: 10/27/2025, 1:51:46 AM
Last enriched: 11/13/2025, 12:49:25 PM
Last updated: 12/14/2025, 8:18:35 AM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14650: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14649: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14648: Command Injection in DedeBIZ
MediumCVE-2025-14647: SQL Injection in code-projects Computer Book Store
MediumCVE-2025-14646: SQL Injection in code-projects Student File Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.