Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 09 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wpgmaps Wpgmaps wp Go Maps Wpgmaps wp Google Maps |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wpgmaps Wpgmaps wp Go Maps Wpgmaps wp Google Maps |
Thu, 09 Oct 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in all versions up to, and including, 9.0.46. This is due to the plugin exposing state-changing REST actions through an AJAX bridge without proper CSRF token validation, and having destructive logic reachable via GET requests with no permission_callback. This makes it possible for unauthenticated attackers to force logged-in administrators to create, update, or delete markers and geometry features via CSRF attacks, and allows anonymous users to trigger mass deletion of markers via unsafe GET requests. | |
| Title | WP Go Maps (formerly WP Google Maps) <= 9.0.46 - Cross-Site Request Forgery to Plugin Settings Update | |
| Weaknesses | CWE-352 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:04:17.640Z
Reserved: 2025-09-29T16:49:57.375Z
Link: CVE-2025-11166
Updated: 2025-10-09T18:10:51.974Z
Status : Deferred
Published: 2025-10-09T02:15:41.213
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-11166
No data.
OpenCVE Enrichment
Updated: 2026-04-22T13:15:17Z