CVE-2025-66158: CWE-862 Missing Authorization in merkulove Gmaper for Elementor
Missing Authorization vulnerability in merkulove Gmaper for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Gmaper for Elementor: from n/a through 1.0.9.
AI Analysis
Technical Summary
CVE-2025-66158 is a Missing Authorization vulnerability classified under CWE-862 found in the merkulove Gmaper plugin for Elementor, a WordPress plugin used to integrate Google Maps functionality into websites. The vulnerability arises from incorrectly configured access control security levels, allowing users with limited privileges (PR:L - privileges required) to perform actions that should be restricted. The vulnerability affects all versions up to 1.0.9, though the exact range is unspecified ('n/a' to 1.0.9). The CVSS v3.1 score is 5.4 (medium), with an attack vector of network (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). This means an attacker with some level of authenticated access can exploit the flaw remotely without user interaction to alter data or disrupt service availability. The vulnerability does not expose confidential information but can undermine the integrity of the plugin’s functionality and availability of map features on affected websites. No known exploits are currently reported in the wild, and no patches have been released at the time of publication. The issue was reserved in November 2025 and published at the end of December 2025. The vulnerability is particularly relevant for organizations using WordPress sites with Elementor and the Gmaper plugin, as it could allow malicious insiders or compromised accounts to escalate their privileges or cause service disruptions.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity and availability of web services that rely on the Gmaper plugin for displaying maps. Organizations in sectors such as tourism, real estate, logistics, and local government that embed maps on their websites may experience unauthorized modifications or temporary outages of map features, potentially degrading user experience and trust. While confidentiality is not directly impacted, the disruption or manipulation of map data could indirectly affect business operations and customer interactions. Since exploitation requires some level of privileges, the threat is more significant in environments where user privilege management is lax or where insider threats exist. The lack of patches increases exposure time, and organizations using outdated versions of the plugin are at higher risk. Given the widespread use of WordPress and Elementor in Europe, especially in small and medium enterprises, the vulnerability could have a broad impact if exploited at scale.
Mitigation Recommendations
1. Immediately audit user roles and permissions within WordPress to ensure that only trusted users have privileges that could exploit this vulnerability. 2. Restrict access to the Gmaper plugin’s administrative functions to the minimum necessary users. 3. Monitor logs for unusual activity related to map configuration or plugin settings changes. 4. Disable or remove the Gmaper plugin if it is not essential to reduce the attack surface. 5. Implement web application firewalls (WAF) with rules to detect and block suspicious requests targeting the plugin endpoints. 6. Stay alert for official patches or updates from merkulove and apply them promptly once available. 7. Consider deploying plugin vulnerability scanners that can detect outdated or vulnerable versions of Gmaper. 8. Educate site administrators about the risks of privilege escalation and the importance of strong access controls. 9. Use multi-factor authentication (MFA) for all WordPress admin accounts to reduce the risk of compromised credentials being used to exploit this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-66158: CWE-862 Missing Authorization in merkulove Gmaper for Elementor
Description
Missing Authorization vulnerability in merkulove Gmaper for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Gmaper for Elementor: from n/a through 1.0.9.
AI-Powered Analysis
Technical Analysis
CVE-2025-66158 is a Missing Authorization vulnerability classified under CWE-862 found in the merkulove Gmaper plugin for Elementor, a WordPress plugin used to integrate Google Maps functionality into websites. The vulnerability arises from incorrectly configured access control security levels, allowing users with limited privileges (PR:L - privileges required) to perform actions that should be restricted. The vulnerability affects all versions up to 1.0.9, though the exact range is unspecified ('n/a' to 1.0.9). The CVSS v3.1 score is 5.4 (medium), with an attack vector of network (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). This means an attacker with some level of authenticated access can exploit the flaw remotely without user interaction to alter data or disrupt service availability. The vulnerability does not expose confidential information but can undermine the integrity of the plugin’s functionality and availability of map features on affected websites. No known exploits are currently reported in the wild, and no patches have been released at the time of publication. The issue was reserved in November 2025 and published at the end of December 2025. The vulnerability is particularly relevant for organizations using WordPress sites with Elementor and the Gmaper plugin, as it could allow malicious insiders or compromised accounts to escalate their privileges or cause service disruptions.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity and availability of web services that rely on the Gmaper plugin for displaying maps. Organizations in sectors such as tourism, real estate, logistics, and local government that embed maps on their websites may experience unauthorized modifications or temporary outages of map features, potentially degrading user experience and trust. While confidentiality is not directly impacted, the disruption or manipulation of map data could indirectly affect business operations and customer interactions. Since exploitation requires some level of privileges, the threat is more significant in environments where user privilege management is lax or where insider threats exist. The lack of patches increases exposure time, and organizations using outdated versions of the plugin are at higher risk. Given the widespread use of WordPress and Elementor in Europe, especially in small and medium enterprises, the vulnerability could have a broad impact if exploited at scale.
Mitigation Recommendations
1. Immediately audit user roles and permissions within WordPress to ensure that only trusted users have privileges that could exploit this vulnerability. 2. Restrict access to the Gmaper plugin’s administrative functions to the minimum necessary users. 3. Monitor logs for unusual activity related to map configuration or plugin settings changes. 4. Disable or remove the Gmaper plugin if it is not essential to reduce the attack surface. 5. Implement web application firewalls (WAF) with rules to detect and block suspicious requests targeting the plugin endpoints. 6. Stay alert for official patches or updates from merkulove and apply them promptly once available. 7. Consider deploying plugin vulnerability scanners that can detect outdated or vulnerable versions of Gmaper. 8. Educate site administrators about the risks of privilege escalation and the importance of strong access controls. 9. Use multi-factor authentication (MFA) for all WordPress admin accounts to reduce the risk of compromised credentials being used to exploit this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:23:13.461Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69555650db813ff03ef42843
Added to database: 12/31/2025, 4:58:56 PM
Last enriched: 12/31/2025, 5:15:22 PM
Last updated: 1/8/2026, 7:21:33 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.