MapPress Maps for WordPress is a popular plugin used to create and manage maps on WordPress sites. It allows users to easily embed maps and display locations using the Google Maps API. With over 50,000 active installations, it is a widely trusted tool for website owners looking to add interactive maps to their pages. However, a critical vulnerability—CVE-2025-2055—has been discovered in the plugin that allows an attacker to exploit stored Cross-Site Scripting (XSS), which could lead to account takeover and privilege escalation, potentially giving an attacker admin access. This issue is particularly concerning for websites that use MapPress to display sensitive location-based data.

CVECVE-2025-2055
MapPress Maps for WordPress < 2.94.9
CriticalHigh
All Time4 630 195
Active installations50 000+
Publicly PublishedApril 22, 2025
Last UpdatedApril 22, 2025
ResearcherDmitrii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2055
https://wpscan.com/vulnerability/a8bfdbbf-6963-4fab-826a-6be770ac72c3/
Plugin Security Certification by CleanTalk
Logo of the plugin

Join the community of developers who prioritize security. Highlight your plugin in the WordPress catalog.

PSC by Cleantalk

Timeline

March 4, 2025Plugin testing and vulnerability detection in the MapPress have been completed
March 4, 2025I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
April 22, 2025Registered CVE-2025-2055

Discovery of the Vulnerability

The vulnerability was found during the process of testing the MapPress plugin. It is present in the “Description Title” field within the map’s settings. The plugin fails to properly sanitize input provided by the user in this field, allowing an attacker to inject malicious JavaScript code. This input is then stored in the WordPress database and executed when the map is displayed, creating the possibility for privilege escalation and backdoor creation. The vulnerability affects users with contributor or higher roles, meaning that an attacker with these permissions could exploit the vulnerability to gain full admin access, creating significant security risks.

Understanding of XSS attack’s

Cross-Site Scripting (XSS) is one of the most common and dangerous vulnerabilities found in web applications. It allows attackers to inject malicious scripts into web pages viewed by other users, typically resulting in session hijacking, unauthorized actions on behalf of the user, or the creation of backdoors. In the context of WordPress, XSS vulnerabilities are particularly problematic due to the ease with which they can be exploited, especially in plugins like MapPress that allow user-generated content. Real-world examples include incidents where XSS was used to steal admin credentials, escalate privileges, or manipulate content. CVE-2025-2055 shares this nature, enabling an attacker to inject JavaScript into the “Description Title” field and subsequently escalate their privileges to an admin account.

Exploiting the XSS Vulnerability

To exploit CVE-2025-2055, an attacker with contributor+ privileges:

POC:

1) Go to Maps http://127.0.0.1/wordpress/wp-admin/admin.php?page=mappress_maps
2) Create a new Map with any place
3) Click on this place in left side of interface
4) Change "Description Title" field to Sud Department&lt;img src=x onerror=alert(1)&gt;
5) To trigger XSS you should create a new POST with shortcode of this map

____

The risks associated with CVE-2025-2055 are severe, especially for websites that handle sensitive data or have administrative capabilities accessible to multiple users. In a real-world scenario, an attacker could exploit this XSS vulnerability to inject scripts that steal session cookies or create backdoors. Once an admin’s session is hijacked, the attacker could gain full control over the WordPress site, modify settings, and access user data. For websites using MapPress to display sensitive location data, this could lead to data manipulation, unauthorized access to customer information, or the deployment of malware. This vulnerability could also be used to escalate from contributor-level roles to admin roles, giving attackers complete control over the website.

Recommendations for Improved Security

To mitigate the risk of CVE-2025-2055, users of the MapPress plugin should immediately update to the latest version that addresses this vulnerability. The plugin developers should ensure proper input sanitization for all user-submitted content, particularly in fields like “Description Title” that render content in a public-facing context. WordPress’s esc_html()wp_kses(), and other sanitization functions should be used to strip out malicious code from input fields. Additionally, WordPress administrators should regularly monitor and limit user roles, ensuring that only trusted users have access to sensitive settings within the plugin. Regular security audits and penetration testing can help identify such vulnerabilities and prevent them from being exploited. To prevent this type of attacks vendor used our methods of prevention.

By taking proactive measures to address Stored XSS vulnerabilities like CVE-2025-2055, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

Dmitrii I.
CVE-2025-2055 – MapPress Maps for WordPress – Stored XSS to Admin Creation (Contributor+) – POC

Leave a Reply

Your email address will not be published. Required fields are marked *