CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Lifecycle Timeline
2DescriptionNVD
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RomanCode MapSVG mapsvg-lite-interactive-vector-maps allows DOM-Based XSS.This issue affects MapSVG: from n/a through <= 8.7.22.
AnalysisAI
DOM-based cross-site scripting (XSS) in RomanCode MapSVG WordPress plugin versions up to 8.7.22 allows remote attackers to inject malicious scripts into web pages viewed by other users. The vulnerability requires user interaction (UI:R) and affects the confidentiality and integrity of web sessions. Although the CVSS score is 6.1 (medium), the EPSS exploitation probability is very low at 0.02%, and no public exploit code or active exploitation has been identified; this suggests the practical attack likelihood is minimal despite the moderate CVSS rating.
Technical ContextAI
The vulnerability stems from improper input neutralization during dynamic web page generation, classified as CWE-79 (Improper Neutralization of Input During Web Page Generation). MapSVG is a WordPress plugin that generates interactive SVG-based vector maps. The DOM-based XSS occurs when user-controlled input is rendered into the DOM without adequate sanitization or output encoding, allowing attackers to inject arbitrary JavaScript that executes in the context of affected users' browsers. The attack vector is network-based, requires no special privileges (PR:N), but does require user interaction (UI:R), such as clicking a malicious link or visiting a compromised page.
Affected ProductsAI
RomanCode MapSVG (mapsvg-lite-interactive-vector-maps WordPress plugin) versions from an unspecified starting point through version 8.7.22 inclusive are affected. The plugin is available via the WordPress Plugin Directory and distributed under the RomanCode brand. Affected users should identify their installed version in the WordPress plugins management interface or via wp-cli; any version numbered 8.7.22 or earlier requires remediation.
RemediationAI
Update the MapSVG plugin to a version newer than 8.7.22 via the WordPress plugin management dashboard (Plugins > Installed Plugins > MapSVG, then click Update if available) or via command line using wp-cli. If a patched version number is not yet publicly released, check the plugin's changelog on wordpress.org/plugins/mapsvg-lite-interactive-vector-maps or contact RomanCode directly for guidance. As an interim measure, restrict plugin functionality to trusted administrators only and limit user input sources that feed into map generation until a patch is confirmed available. See https://patchstack.com/database/Wordpress/Plugin/mapsvg-lite-interactive-vector-maps/vulnerability/wordpress-mapsvg-plugin-8-7-15-cross-site-scripting-xss-vulnerability for vendor advisory details.
Share
External POC / Exploit Code
Leaving vuln.today