MapSVG Vulnerability (Medium) – CVE-2025-47562

MapSVG Vulnerability (Medium) – CVE-2025-47562

by | Feb 14, 2026 | Plugins

Attack Vectors

MapSVG (slug: mapsvg) has a Medium severity vulnerability (CVSS 6.5) identified as CVE-2025-47562 that allows unauthenticated arbitrary shortcode execution in versions up to and including 8.5.34.

Because no login is required, an external attacker can attempt to trigger the affected behavior remotely. In practical terms, this means an attacker may be able to run WordPress shortcodes in ways the site owner did not intend, depending on what shortcodes are available on your site and how they are configured.

Security Weakness

The weakness is rooted in how the plugin handles an action that runs WordPress shortcode processing. According to the published advisory, the issue occurs because a value is not properly validated before the plugin calls WordPress’s shortcode execution functionality, enabling attackers to execute shortcodes without authentication.

While “shortcode execution” can sound benign, it becomes a meaningful security risk when shortcodes expose sensitive content, trigger state changes, or interact with other plugins and site features in unexpected ways.

Technical or Business Impacts

From a business-risk perspective, this type of vulnerability can lead to unauthorized content access or modification (the CVSS vector indicates low confidentiality and integrity impact). The exact outcome depends on which shortcodes exist on your site (including those provided by other plugins) and what they are capable of doing.

For marketing and executive stakeholders, the risk is that a public-facing site could be manipulated in ways that affect brand trust, campaign integrity, and compliance posture. Even limited exposure—such as unintended data display or small content changes—can create reputational and operational distractions, especially during high-traffic campaigns.

Remediation: Update MapSVG to 8.6.11 or a newer patched version as recommended by the source advisory. For reference, see the advisory source at Wordfence Threat Intelligence.

Similar Attacks

Public reports and incident write-ups show that attackers often target WordPress plugins to gain unauthorized capabilities—especially when the attack does not require a login. Examples include:

WP Automatic (CVE-2024-27956) coverage by Wordfence

Essential Addons for Elementor vulnerability coverage by Wordfence

wpDataTables vulnerability coverage by Wordfence

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers