CVE-2024-13306
📋 TL;DR
This vulnerability allows high-privilege WordPress users (like administrators) to inject malicious scripts into the Maps Plugin using Google Maps settings. The stored XSS payload executes when other users view affected pages, even in multisite setups where unfiltered_html is normally restricted. Only WordPress sites using vulnerable plugin versions are affected.
💻 Affected Systems
- Maps Plugin using Google Maps for WordPress
📦 What is this software?
Wp Google Map by Wpgooglemap
⚠️ Risk & Real-World Impact
Worst Case
Administrator account compromise leading to full site takeover, data theft, or malware distribution to visitors.
Likely Case
Privileged user injects malicious scripts that steal session cookies or redirect users to phishing sites.
If Mitigated
Limited impact with proper user access controls and regular security monitoring.
🎯 Exploit Status
Exploitation requires admin-level access. Attack would involve injecting JavaScript into plugin settings that executes when other users view affected pages.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.9.4
Vendor Advisory: https://wpscan.com/vulnerability/ec3096f2-60fd-4654-9e95-5cf4b20b2990/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Maps Plugin using Google Maps'. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.9.4+ from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Remove vulnerable plugin
allTemporarily disable or remove the plugin until patched
wp plugin deactivate maps-plugin-using-google-maps
wp plugin delete maps-plugin-using-google-maps
Restrict admin access
allTemporarily limit administrative access to trusted users only
🧯 If You Can't Patch
- Implement strict user access controls and monitor admin activities
- Deploy web application firewall with XSS protection rules
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins > Installed Plugins. If version is below 1.9.4, you are vulnerable.
Check Version:
wp plugin get maps-plugin-using-google-maps --field=version
Verify Fix Applied:
Confirm plugin version shows 1.9.4 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual plugin setting modifications by admin users
- JavaScript injection patterns in plugin configuration
Network Indicators:
- Suspicious outbound connections from admin pages
- Unexpected script loading from plugin URLs
SIEM Query:
source="wordpress" AND (event="plugin_updated" OR event="option_updated") AND plugin="maps-plugin-using-google-maps"