The Mapplic and Mapplic Lite plugins for WordPress are vulnerable to Server-Side Request Forgery in versions up to, and including 6.1, 1.0 respectively. This makes it possible for attackers to forgery requests coming from a vulnerable site's server and ultimately perform an XSS attack if requesting an SVG file.
References
| Link | Resource |
|---|---|
| https://packetstormsecurity.com/files/161919/ | Exploit Third Party Advisory |
| https://packetstormsecurity.com/files/161920/ | Exploit Third Party Advisory |
| https://plugins.trac.wordpress.org/changeset/2503447 | Patch |
| https://www.mapplic.com/docs/#changelog | Release Notes |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/5aacabb5-94af-485a-af24-e84db3e3726f?source=cve | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
19 Dec 2025, 22:17
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:mapplic:mapplic:*:*:*:*:-:wordpress:*:* cpe:2.3:a:mapplic:mapplic:*:*:*:*:lite:wordpress:*:* |
|
| First Time |
Mapplic mapplic
Mapplic |
|
| References | () https://packetstormsecurity.com/files/161919/ - Exploit, Third Party Advisory | |
| References | () https://packetstormsecurity.com/files/161920/ - Exploit, Third Party Advisory | |
| References | () https://plugins.trac.wordpress.org/changeset/2503447 - Patch | |
| References | () https://www.mapplic.com/docs/#changelog - Release Notes | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/5aacabb5-94af-485a-af24-e84db3e3726f?source=cve - Third Party Advisory |
16 Oct 2024, 16:38
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
16 Oct 2024, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-10-16 07:15
Updated : 2025-12-19 22:17
NVD link : CVE-2012-10018
Mitre link : CVE-2012-10018
CVE.ORG link : CVE-2012-10018
JSON object : View
Products Affected
mapplic
- mapplic
CWE
CWE-918
Server-Side Request Forgery (SSRF)
