The Mapplic and Mapplic Lite plugins for WordPress are vulnerable to Server-Side Request Forgery in versions up to, and including 6.1, 1.0 respectively. This makes it possible for attackers to forgery requests coming from a vulnerable site's server and ultimately perform an XSS attack if requesting an SVG file.
References
| Link | Resource |
|---|---|
| https://packetstormsecurity.com/files/161919/ | Exploit Third Party Advisory |
| https://packetstormsecurity.com/files/161920/ | Exploit Third Party Advisory |
| https://plugins.trac.wordpress.org/changeset/2503447 | Patch |
| https://www.mapplic.com/docs/#changelog | Release Notes |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/5aacabb5-94af-485a-af24-e84db3e3726f?source=cve | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-10-16 07:15
Updated : 2025-12-19 22:17
NVD link : CVE-2012-10018
Mitre link : CVE-2012-10018
CVE.ORG link : CVE-2012-10018
JSON object : View
Products Affected
mapplic
- mapplic
CWE
CWE-918
Server-Side Request Forgery (SSRF)
