WordPress Locatoraid Store Locator Plugin <= 3.9.18 is vulnerable to Cross Site Scripting (XSS)
Description
Auth. (subscriber+) Stored Cross-Site Scripting') vulnerability in Plainware Locatoraid Store Locator plugin <= 3.9.18 versions.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Locatoraid Store Locator plugin for WordPress up to version 3.9.18 contains a stored cross-site scripting vulnerability exploitable by authenticated users with subscriber-level access or higher.
Vulnerability
The Locatoraid Store Locator plugin for WordPress (versions up to and including 3.9.18) [1] is vulnerable to stored cross-site scripting (XSS) due to insufficient input sanitization and output escaping. The vulnerability is present in the plugin's handling of location data, allowing authenticated users with subscriber-level privileges to inject arbitrary JavaScript code that gets stored and executed when other users view the affected page.
Exploitation
An attacker must have a valid WordPress account with at least subscriber-level permissions. They can exploit the vulnerability by submitting malicious input through forms or fields that store location data, such as location name, address, or custom fields. The injected script is stored in the database and executed in the browsers of users (including administrators) who view the location listings or maps rendered by the plugin.
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, theft of cookies, defacement of the site, or redirection to malicious sites. The scope is limited to the WordPress installation's user sessions and data accessible via the authenticated user's privileges.
Mitigation
The vendor has addressed the vulnerability in version 3.9.19 and later [1]. Users are strongly advised to update the Locatoraid Store Locator plugin to the latest version (3.9.70 or higher). No workarounds are publicly available.
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=3.9.18
- Range: n/a
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.