CVE-2025-31613

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in the AB Google Map Travel WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. Attackers could exploit this to inject malicious scripts that execute when other users visit affected pages. All WordPress sites using AB Google Map Travel plugin versions up to 4.6 are affected.

💻 Affected Systems

Products:
  • AB Google Map Travel WordPress Plugin
Versions: n/a through 4.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and an authenticated administrator to trigger the CSRF.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could chain CSRF with stored XSS to compromise administrator accounts, deface websites, or steal sensitive data from visitors through persistent malicious scripts.

🟠

Likely Case

Attackers create malicious pages that trick logged-in administrators into changing plugin settings or injecting malicious content, leading to stored XSS affecting site visitors.

🟢

If Mitigated

With proper CSRF tokens and same-origin policies, the attack fails as unauthorized requests are rejected before reaching vulnerable endpoints.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick authenticated users into visiting malicious pages. The vulnerability can be chained with stored XSS for broader impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 4.6

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/ab-google-map-travel/vulnerability/wordpress-ab-google-map-travel-plugin-4-6-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Locate 'AB Google Map Travel'. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Implement CSRF Protection Headers

Apache

Add security headers to WordPress to help prevent CSRF attacks

Add to .htaccess: Header set X-Frame-Options "SAMEORIGIN"
Add to .htaccess: Header set Content-Security-Policy "frame-ancestors 'self'"

🧯 If You Can't Patch

  • Disable the AB Google Map Travel plugin immediately
  • Implement strict access controls and monitor administrator account activity for suspicious behavior

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for AB Google Map Travel version. If version is 4.6 or earlier, you are vulnerable.

Check Version:

wp plugin list --name='AB Google Map Travel' --field=version

Verify Fix Applied:

After updating, verify plugin version shows higher than 4.6. Test plugin functionality to ensure it still works properly.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed CSRF token validations in WordPress logs
  • Unexpected plugin setting changes by administrator accounts

Network Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php with plugin-specific parameters from unexpected referrers

SIEM Query:

source="wordpress.log" AND ("csrf" OR "nonce" OR "invalid token") AND plugin="ab-google-map-travel"

🔗 References

📤 Share & Export