CVE-2012-10018
moderate-risk
Published 2024-10-16
The Mapplic and Mapplic Lite plugins for WordPress are vulnerable to Server-Side Request Forgery in versions up to, and including 6.1, 1.0 respectively. This makes it possible for attackers to forgery requests coming from a vulnerable site's server and ultimately perform an XSS attack if requesting an SVG file.
Do I need to act?
~
3.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.3/10
High
NETWORK
/ LOW complexity
Affected Products (2)
Mapplic
Mapplic
Affected Vendors
References (5)
Release Notes
https://www.mapplic.com/docs/#changelog
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/5aacabb5-94af-485a-af2...
43
/ 100
moderate-risk
Severity
29/34 · Critical
Exploitability
7/34 · Low
Exposure
7/34 · Low