WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Di…

WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Di…

by | Mar 10, 2026 | Plugins

Attack Vectors

WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters (slug: wp-google-map-plugin) versions up to and including 4.9.1 are affected by CVE-2026-3222, a High severity issue (CVSS 7.5, vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

The vulnerability is an unauthenticated SQL Injection reachable over the network without login (no privileges required and no user interaction required). It is triggered through the location_id parameter, including via the plugin’s unauthenticated AJAX handler (wpgmp_ajax_call registered with wp_ajax_nopriv).

Because this is described as a time-based blind SQL injection, attackers can probe the database by measuring response timing—often a sign of automated scanning and exploitation attempts that can scale across many sites.

Reference: CVE-2026-3222 record.

Security Weakness

The issue stems from how the plugin’s database abstraction layer handles input. Specifically, FlipperCode_Model_Base::is_column() can treat user-controlled input wrapped in backticks as a column name, which can bypass the intended escaping (esc_sql()). This creates an opportunity for malicious SQL fragments to be processed in a way the plugin did not intend.

In addition, the unauthenticated AJAX handler can allow calling class methods (including wpgmp_return_final_capability) that can pass the unsanitized location_id GET parameter along the execution path, enabling injection.

In business terms: this is a validation and input-handling failure in a public-facing endpoint, which increases exposure because the attacker does not need an account.

Technical or Business Impacts

The CVSS profile indicates a high confidentiality impact (C:H) with no direct integrity or availability impact scored (I:N/A:N). Practically, that means the primary risk is data exposure—for example, attackers may be able to extract sensitive information from the WordPress database over time using blind techniques.

For marketing and executive stakeholders, the most material outcomes typically include: potential exposure of customer/contact data stored in WordPress, loss of trust, incident response and legal/compliance costs, and disruption to campaigns while containment and forensic review occur. If regulated personal data is involved, this may also trigger reporting obligations depending on jurisdiction and contractual requirements.

Similar attacks have driven real-world breaches where SQL injection was used to access sensitive data, such as the TalkTalk 2015 cyber attack and the Heartland Payment Systems data breach.

Remediation: update WP Maps to version 4.9.2 or newer (patched). Source advisory: Wordfence vulnerability report.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers