CVE-2025-11365

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers with Contributor-level access or higher to perform blind SQL injection attacks via the 'id' parameter in the WP Google Map Plugin's shortcode. Attackers can extract sensitive information from the database by injecting malicious SQL queries. All WordPress sites using this plugin up to version 1.0 are affected.

💻 Affected Systems

Products:
  • WP Google Map Plugin for WordPress
Versions: All versions up to and including 1.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires plugin to be installed and active. Attacker needs at least Contributor-level WordPress user access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including extraction of user credentials, sensitive content, and potentially privilege escalation to administrative access.

🟠

Likely Case

Extraction of sensitive data like user emails, hashed passwords, and private content from the database.

🟢

If Mitigated

Limited impact if proper access controls and input validation are in place, though SQL injection remains possible.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, and authenticated users can exploit this remotely.
🏢 Internal Only: MEDIUM - Internal attackers with contributor access could exploit this, but requires authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of SQL injection techniques. Blind SQL injection requires more sophisticated exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.0 (check WordPress plugin repository for latest)

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wp-google-map/trunk/shortcode.php#L8

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WP Google Map Plugin'. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin immediately.

🔧 Temporary Workarounds

Remove vulnerable shortcode usage

all

Temporarily remove or disable any usage of the 'google_map' shortcode in posts/pages until patched.

🧯 If You Can't Patch

  • Remove Contributor and higher access from untrusted users
  • Implement web application firewall (WAF) with SQL injection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'WP Google Map Plugin' version 1.0 or earlier.

Check Version:

wp plugin list --name='wp-google-map' --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify plugin version is greater than 1.0 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by SQL-like patterns in requests

Network Indicators:

  • HTTP POST/GET requests with SQL injection patterns in 'id' parameter to WordPress endpoints

SIEM Query:

web.url:*google_map* AND (web.query:*id=* OR web.query:*id%*) AND web.query:*(SELECT|UNION|INSERT|UPDATE|DELETE|DROP|OR|AND)*

🔗 References

📤 Share & Export