YaMaps for WordPress Plugin Vulnerability (Medium) – CVE-2025-14851

YaMaps for WordPress Plugin Vulnerability (Medium) – CVE-2025-14851

by | Feb 18, 2026 | Plugins

Attack Vectors

CVE-2025-14851 affects the YaMaps for WordPress plugin (slug: yamaps) in versions up to and including 0.6.40, and is rated Medium severity (CVSS 6.4). The issue is a stored cross-site scripting (XSS) vulnerability that can be triggered through the yamap shortcode parameters.

The practical risk is internal: an authenticated WordPress user with at least Contributor access can inject malicious script content into a page or post where the shortcode is used. Because it is “stored,” the script can run later for anyone who views the affected page—without requiring that visitor to click anything.

Security Weakness

The root cause is insufficient input sanitization and output escaping for user-supplied shortcode attributes in YaMaps for WordPress <= 0.6.40. In business terms, the plugin does not adequately validate or safely display certain shortcode parameters before rendering them on the site.

This weakness matters because WordPress shortcodes are often used in marketing pages and landing pages—high-traffic areas where a single injected page can expose many visitors, customers, and employees to a malicious script.

Technical or Business Impacts

Stored XSS can lead to brand and revenue damage even when the vulnerability is “only” Medium severity. If exploited, an attacker could alter how a page behaves for visitors, potentially capturing form entries, redirecting users, displaying unauthorized content, or interfering with analytics and conversion tracking.

For leadership and compliance teams, the key impacts include reputational harm (customers seeing suspicious behavior on your site), increased incident response costs, and potential compliance exposure if user data is mishandled during an attack. Marketing teams may also see campaign performance disrupted if scripts manipulate landing page content, tags, or attribution signals.

Recommended action: update YaMaps for WordPress to version 0.6.41 or newer (patched). Track this as a time-sensitive maintenance item because the required attacker privilege (Contributor+) is commonly granted to content creators, agencies, or vendors.

Similar Attacks

Stored XSS vulnerabilities in WordPress ecosystems are frequently abused because they can persist on high-visibility pages. For reference, here are a few well-known examples of cross-site scripting issues (not specific to YaMaps) that illustrate the broader pattern:

CISA Alert: WordPress Elementor Pro Vulnerable to Authenticated Reflected XSS (2022)

CVE-2018-6389: WordPress Core DoS issue (often discussed alongside WordPress hardening and web attack risk)

Wordfence blog: Ongoing reporting on WordPress plugin XSS and related exploitation trends

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers