CVE-2023-33926

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in the Supsystic Easy Google Maps WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. Attackers can create malicious requests that execute when an admin visits a compromised page, potentially modifying plugin settings or maps. WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Supsystic Easy Google Maps WordPress Plugin
Versions: <= 1.11.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable plugin version and admin user interaction.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify all plugin settings, embed malicious content in maps, or potentially chain with other vulnerabilities for site takeover.

🟠

Likely Case

Attackers modify map configurations, inject malicious scripts into maps, or disrupt plugin functionality.

🟢

If Mitigated

With proper CSRF tokens and same-origin policies, exploitation is prevented entirely.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to weaponize, though exploitation requires admin interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 1.11.7

Vendor Advisory: https://patchstack.com/database/vulnerability/google-maps-easy/wordpress-easy-google-maps-plugin-1-11-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Easy Google Maps' plugin. 4. Click 'Update Now' if available. 5. If no update appears, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to plugin forms and validate them server-side.

Restrict Admin Access

all

Limit admin panel access to trusted IP addresses only.

🧯 If You Can't Patch

  • Disable the plugin entirely if not essential
  • Implement web application firewall rules to block CSRF attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Easy Google Maps' version <= 1.11.7.

Check Version:

wp plugin list --name='easy-google-maps' --field=version

Verify Fix Applied:

Verify plugin version is > 1.11.7 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to plugin admin endpoints without referrer validation
  • Unexpected plugin configuration changes

Network Indicators:

  • Requests to plugin admin endpoints with suspicious referrers or origins

SIEM Query:

source="wordpress.log" AND (uri="/wp-admin/admin-ajax.php" OR uri CONTAINS "google-maps-easy") AND method="POST" AND referrer NOT CONTAINS site_domain

🔗 References

📤 Share & Export