S4E Mobile Logo

CVE-2024-13220 Scanner

CVE-2024-13220 Scanner - Cross-Site Scripting (XSS) vulnerability in WordPress Google Map Professional

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

2 weeks 5 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

WordPress Google Map Professional is a plugin used in WordPress sites to integrate Google Maps into web pages. It is often implemented by website administrators and developers to enhance the functionality of sites that require mapping features. The plugin is designed to allow easy customization and embedding of Google Maps for a variety of professional and business purposes. This tool serves many industries, including real estate, travel, and logistics, enabling them to display geographical data effectively. It is particularly common among those looking to provide dynamic location details on their WordPress sites. By providing an easy interface to Google Maps, the plugin helps users who may not have extensive programming knowledge to deliver complex geographic services on their websites.

This vulnerability involves Cross-Site Scripting (XSS), where attackers can exploit the lack of input validation and sanitization to execute arbitrary scripts. The XSS vulnerability is specifically of the reflected type, meaning it requires the victim to load a maliciously crafted URL. Once this URL is accessed by a victim with high privileges, such as an admin, the malicious script runs within their context. This could allow attackers to compromise accounts or hijack sessions effectively. XSS vulnerabilities in plugins like WordPress Google Map Professional pose significant risks due to the potential impact on site administration and user data.

The vulnerability stems from the plugin's failure to sanitize and escape user input before embedding it into output pages. Specifically, the vulnerable endpoint is 'admin.php?page=googlemarker-admin&marker_id=' where untrusted input is rendered without proper escaping. This creates an attack vector for executing JavaScript when a high-privilege user interacts with a crafted URL. It relies on the ability to inject payloads in a manner that the plugin does not adequately filter, leading to potential script execution. The vulnerability could let attackers gain unauthorized control over administrative functionalities through session hijacking. Successful exploitation requires a victim to visit a specially crafted URL, highlighting the importance of vigilant URL or link checking procedures.

If the vulnerability is exploited, it could lead to several serious issues including unauthorized access to administrative accounts and exposure of sensitive administrative data. Attackers can conduct session hijacking by executing scripts in the context of authenticated users, potentially gaining control over their accounts. This vulnerability also poses risks of inserting malwares or data corruption by attackers under elevated privileges. Website integrity may be compromised, as injected scripts could lead to further data exposure or alteration of displayed content. Furthermore, it could result in phishing attacks against administrative users through crafted messages or alerts that mimic legitimate ones.

REFERENCES

Get started to protecting your digital assets