CVE-2019-9912 Scanner
CVE-2019-9912 Scanner - Cross-Site Scripting (XSS) vulnerability in WP Google Maps Plugin
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
3 weeks 19 hours
Scan only one
URL
Toolbox
-
WP Google Maps is a widely used plugin for WordPress sites, allowing users to create custom maps with high levels of detail. This plugin is often utilized by website owners seeking to provide geographical representation or directions to their physical locations. It is ideal for travel blogs, real estate sites, and businesses that rely on geographical data. The plugin enhances user engagement by adding interactive map features to websites. WP Google Maps integrates seamlessly with WordPress, making it a popular choice for developers and site administrators. Its user-friendly interface allows even non-technical users to implement advanced map functionalities on their sites.
The Cross-Site Scripting (XSS) vulnerability in WP Google Maps allows an attacker to inject malicious scripts. These scripts can execute in the browser of the victim who views the crafted content. The vulnerability exists due to insufficient sanitization of PATH_INFO in the wp-admin/admin.php file. Successful exploitation can lead to unauthorized actions being performed on behalf of the victim. It may allow attackers to steal session tokens, redirect users, or display misleading information. XSS vulnerabilities are significant due to their potential impact on application integrity and data security.
The technical root of the vulnerability lies in the handling of the PATH_INFO parameter without adequate input validation. Specifically, the plugin fails to properly sanitize user input before reflecting it back onto the page. Matchers confirm the presence of the XSS payload if the response contains an HTML tag injection with an alert. The endpoint 'wp-admin/admin.php' thus becomes a vector for executing unauthorized scripts. Additional content types and status codes help ensure the payload is delivered successfully to the user.
If exploited, this XSS vulnerability could have several adverse effects. End users might experience unauthorized redirects to malicious sites or unwanted pop-ups. There is also potential for session hijacking, allowing attackers to impersonate users. With sufficient leverage, attackers could perform actions on behalf of users, modifying features or stealing personal data. The reputation of websites using vulnerable versions of the plugin may suffer, leading to loss of user trust. Furthermore, infected sites could serve as launch points for further attacks.