CVE-2024-29931
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts into web pages generated by the WP Go Maps WordPress plugin. When a user visits a specially crafted URL, the script executes in their browser, potentially stealing session cookies or performing actions on their behalf. All WordPress sites using vulnerable versions of the WP Go Maps plugin are affected.
💻 Affected Systems
- WP Go Maps (formerly WP Google Maps) WordPress plugin
📦 What is this software?
Wp Go Maps by Codecabin
Wp Go Maps by Codecabin
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal administrator session cookies, gain full control of the WordPress site, install backdoors, deface the site, or steal sensitive user data.
Likely Case
Attackers steal user session cookies, redirect users to malicious sites, or perform limited actions within the user's context.
If Mitigated
With proper input validation and output encoding, the attack fails silently with no impact.
🎯 Exploit Status
Reflected XSS typically requires user interaction (clicking a malicious link) but is straightforward to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.0.30 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/wp-google-maps/wordpress-wp-go-maps-plugin-9-0-29-reflected-cross-site-scripting-xss-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP Go Maps. 4. Click 'Update Now' if available. 5. Alternatively, download version 9.0.30+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable WP Go Maps plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate wp-google-maps
🧯 If You Can't Patch
- Implement a Web Application Firewall (WAF) with XSS protection rules.
- Restrict plugin access to trusted users only using WordPress role management.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for WP Go Maps version. If version is 9.0.29 or lower, it is vulnerable.
Check Version:
wp plugin get wp-google-maps --field=version
Verify Fix Applied:
After updating, verify the plugin version shows 9.0.30 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual GET/POST requests containing script tags or JavaScript in URL parameters to WP Go Maps endpoints.
- Multiple failed XSS attempts in web server logs.
Network Indicators:
- HTTP requests with suspicious parameters like <script>alert()</script> in URLs.
SIEM Query:
source="web_logs" AND (url="*wp-google-maps*" AND (url="*<script>*" OR url="*javascript:*"))
🔗 References
- https://patchstack.com/database/vulnerability/wp-google-maps/wordpress-wp-go-maps-plugin-9-0-29-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/wp-google-maps/wordpress-wp-go-maps-plugin-9-0-29-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve