DSGVO snippet for Leaflet Map and its Extensions Vulnerability (Med…

DSGVO snippet for Leaflet Map and its Extensions Vulnerability (Med…

by | Mar 25, 2026 | Plugins

Attack Vectors

CVE-2026-4389 is a Medium-severity stored cross-site scripting (XSS) vulnerability (CVSS 6.4) in the WordPress plugin DSGVO snippet for Leaflet Map and its Extensions (slug: dsgvo-leaflet-map) affecting versions up to and including 3.1.

An attacker must be authenticated with at least Contributor privileges. They can inject malicious script into content by abusing the plugin’s leafext-cookie-time and leafext-delete-cookie shortcodes, specifically through the user-controlled shortcode attributes unset, before, and after.

Because this is stored XSS, the injected code can execute whenever anyone opens the affected page or post—potentially including customers, prospects, and internal staff such as administrators reviewing content.

Security Weakness

The issue stems from insufficient input sanitization and output escaping of user-supplied shortcode attributes (unset, before, after) within the plugin’s shortcode rendering. This allows an authenticated user to store script content that the site later serves to other users.

From a governance perspective, this is a common risk area for marketing sites: plugins that enable flexible content/consent components via shortcodes can unintentionally create a path for script injection if the plugin does not strictly validate and safely render user-provided attributes.

Technical or Business Impacts

Stored XSS can create both immediate and downstream business risk. When the injected page is visited, the attacker’s script can run in the visitor’s browser in the context of your domain—meaning it can alter what users see and do on your site.

Potential impacts include:

  • Brand and trust damage: defacement, fake pop-ups, or altered landing-page content can reduce conversion rates and harm reputation.
  • Lead and revenue disruption: scripts can redirect traffic, modify forms, or interfere with tracking/attribution, impacting pipeline reporting and campaign performance.
  • Data and compliance exposure: if a script captures user-entered information (for example, form fields) or tampers with consent experiences, it can raise privacy and regulatory concerns (GDPR/DSGVO contexts are especially sensitive here).
  • Account and operational risk: if administrators view compromised content while logged in, the incident can expand into broader site control issues, increasing recovery time and cost.

Recommended remediation: update DSGVO snippet for Leaflet Map and its Extensions to version 3.4 or newer (patched). After updating, review pages/posts using the affected shortcodes, and consider tightening editorial permissions (least privilege) for contributor accounts and third-party agencies. Source: Wordfence vulnerability advisory. CVE record: CVE-2026-4389.

Similar Attacks

Script-injection and web-skimming incidents show how injected browser-side code can quickly become a material business issue (loss of customer trust, incident response cost, and regulatory scrutiny). Examples include:

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers