WP Go Maps (formerly WP Google Maps) Vulnerability (Medium) – CVE-2…

WP Go Maps (formerly WP Google Maps) Vulnerability (Medium) – CVE-2…

by | Mar 17, 2026 | Plugins

Attack Vectors

CVE-2026-4268 affects the WordPress plugin WP Go Maps (formerly WP Google Maps) (slug: wp-google-maps) in versions 10.0.05 and below. It is rated Medium severity (CVSS 6.4) and can be exploited remotely over the internet.

The key business risk driver is that exploitation only requires an authenticated WordPress account with Subscriber-level access or higher. If your website allows user registration (even for basic access, comments, downloads, partner portals, event signups, etc.), an attacker could create or compromise a low-privilege account and then use it as an entry point.

The attack is performed by injecting malicious script into a settings parameter (wpgmza_custom_js) via the plugin’s settings-saving endpoint. Because it is a stored cross-site scripting (XSS) issue, the malicious code can persist and execute later when a user visits an affected page—often impacting administrators and staff who manage the site.

Security Weakness

This vulnerability is caused by a combination of missing authorization checks and insufficient input sanitization/output escaping in the plugin’s settings save handler (admin_post_wpgmza_save_settings). In practical terms, the plugin does not properly restrict who can submit certain settings changes, and it does not adequately neutralize harmful script content before storing and later displaying it.

Because the malicious payload is saved, it can execute in other users’ browsers without additional clicks or interaction (CVSS indicates no user interaction is required). This is particularly concerning for organizations where marketing, content, and site administration workflows involve frequent logins and page reviews.

Remediation is straightforward: update WP Go Maps to version 10.0.06 or newer, which includes the vendor’s fix. Reference: Wordfence advisory. Official CVE record: CVE-2026-4268.

Technical or Business Impacts

While this is not rated “critical,” the real-world impact can be significant because stored XSS often targets the people with the most access—site admins, marketing ops, and content managers. Potential outcomes include session hijacking (stealing logged-in cookies), unauthorized actions performed in an admin’s browser context, and manipulation of site content.

From a business perspective, this can translate into brand damage (defacement, unwanted popups, or malicious redirects), lead loss (altered forms, tracking changes, or redirecting paid-traffic landing pages), and privacy/compliance exposure if an attacker uses injected scripts to capture data users enter into pages (depending on where the script executes and what the site collects).

Operationally, incidents like this often lead to emergency downtime, campaign disruption, and unplanned spend on incident response. For regulated organizations, it may also trigger internal reporting, vendor risk reviews, or notification obligations depending on what data was exposed and your compliance requirements.

Similar Attacks

Stored and reflected XSS have repeatedly been used for real-world compromise and widespread disruption. A few well-known examples include:

The “Samy” MySpace worm (a classic XSS-driven self-propagating attack that spread rapidly through user profiles).
The 2010 Twitter “onmouseover” worm (an XSS-style issue that caused unwanted actions to execute when users interacted with content).
OWASP guidance on XSS (industry-standard overview of how XSS is abused to steal sessions, alter content, and compromise accounts).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers