cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forosm osm

Direction: ascending
Jun 06, 2024

OSM – OpenStreetMap # CVE-2022-4676

CVE, Research URL

CVE-2022-4676

Date
May 30, 2023
Research Description
The OSM WordPress plugin through 6.01 does not validate and escape some of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
Affected versions
max 6.0.6.
Status
vulnerable

OSM – OpenStreetMap # CVE-2022-30544

CVE, Research URL

CVE-2022-30544

Date
Jan 17, 2023
Research Description
Cross-Site Request Forgery (CSRF) in MiKa's OSM – OpenStreetMap plugin <= 6.0.1 versions.
Affected versions
max 6.0.1.
Status
vulnerable
Jul 10, 2024

OSM &#8211; OpenStreetMap # CVE-2024-3604

CVE, Research URL

CVE-2024-3604

Date
Jul 09, 2024
Research Description
The OSM – OpenStreetMap plugin for WordPress is vulnerable to SQL Injection via the 'tagged_filter' attribute of the 'osm_map_v3' shortcode in all versions up to, and including, 6.0.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
max 6.0.4.
Status
vulnerable

OSM &#8211; OpenStreetMap # CVE-2024-3603

CVE, Research URL

CVE-2024-3603

Date
Jul 09, 2024
Research Description
The OSM – OpenStreetMap plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'osm_map' shortcode in all versions up to, and including, 6.0.2 due to insufficient input sanitization and output escaping on user supplied attributes such as 'theme'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
max 6.0.4.
Status
vulnerable
Sep 28, 2024

OSM &#8211; OpenStreetMap # CVE-2024-8991

CVE, Research URL

CVE-2024-8991

Date
Sep 27, 2024
Research Description
The OSM – OpenStreetMap plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's osm_map and osm_map_v3 shortcodes in all versions up to, and including, 6.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
max 6.1.1.
Status
vulnerable
Nov 12, 2024

OSM &#8211; OpenStreetMap # CVE-2024-52355

CVE, Research URL

CVE-2024-52355

Date
Nov 11, 2024
Research Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hyumika OSM – OpenStreetMap allows Stored XSS.This issue affects OSM – OpenStreetMap: from n/a through 6.1.2.
Affected versions
max 6.1.3.
Status
vulnerable
Apr 02, 2025

OSM &#8211; OpenStreetMap # CVE-2025-31557

CVE, Research URL

CVE-2025-31557

Date
Mar 31, 2025
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MiKa OSM – OpenStreetMap allows DOM-Based XSS. This issue affects OSM – OpenStreetMap: from n/a through 6.1.6.
Affected versions
max 6.1.6.
Status
vulnerable
Feb 27, 2026

OSM &#8211; OpenStreetMap # CVE-2026-25323

CVE, Research URL

CVE-2026-25323

Date
Feb 19, 2026
Research Description
Missing Authorization vulnerability in MiKa OSM osm allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects OSM: from n/a through <= 6.1.12.
Affected versions
max 6.1.12.
Status
vulnerable
Mar 30, 2026

OSM &#8211; OpenStreetMap # CVE-2026-33559

CVE, Research URL

CVE-2026-33559

Date
Mar 27, 2026
Research Description
WordPress Plugin "OpenStreetMap" provided by MiKa contains a cross-site scripting vulnerability. On the site with the affected version of the plugin enabled, a logged-in user with a page-creating/editing privilege can embed some malicious script with a crafted HTTP request. When a victim user accesses this page, the script may be executed in the user's web browser.
Affected versions
max 6.1.15.
Status
vulnerable