CVE-2012-10018
📋 TL;DR
The Mapplic and Mapplic Lite WordPress plugins contain a Server-Side Request Forgery (SSRF) vulnerability that allows attackers to make requests from the vulnerable server to internal or external systems. This can lead to Cross-Site Scripting (XSS) attacks when requesting SVG files. WordPress sites using Mapplic up to version 6.1 or Mapplic Lite up to version 1.0 are affected.
💻 Affected Systems
- Mapplic WordPress Plugin
- Mapplic Lite WordPress Plugin
📦 What is this software?
Mapplic by Mapplic
Mapplic by Mapplic
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise through SSRF leading to internal network reconnaissance, data exfiltration, or remote code execution via chained attacks.
Likely Case
XSS attacks against site visitors, potential data leakage from internal services accessible to the web server, and limited server-side request abuse.
If Mitigated
Limited impact with proper network segmentation, web application firewalls, and input validation controls in place.
🎯 Exploit Status
Public exploit code available on Packet Storm. SSRF to XSS chain requires SVG file request.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Mapplic 6.2+, Mapplic Lite 1.1+
Vendor Advisory: https://www.mapplic.com/docs/#changelog
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Mapplic or Mapplic Lite. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress plugin repository and upload manually.
🔧 Temporary Workarounds
Disable vulnerable plugins
allTemporarily disable Mapplic or Mapplic Lite plugins until patched.
wp plugin deactivate mapplic
wp plugin deactivate mapplic-lite
Web Application Firewall rule
allBlock SSRF attempts at WAF level by filtering suspicious outbound requests from web server.
🧯 If You Can't Patch
- Implement strict network segmentation to limit web server outbound connections
- Deploy a web application firewall with SSRF protection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins for Mapplic version ≤6.1 or Mapplic Lite version ≤1.0
Check Version:
wp plugin list --name=mapplic --field=version
Verify Fix Applied:
Confirm plugin version is Mapplic ≥6.2 or Mapplic Lite ≥1.1 in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from web server to internal IPs or unusual domains
- Multiple requests to SVG files with suspicious parameters
Network Indicators:
- Web server making unexpected outbound HTTP requests
- Requests to internal services from web server IP
SIEM Query:
source="web_server_logs" AND (uri="*svg*" OR user_agent="*Mapplic*") AND status=200