VYPR
Medium severity6.5NVD Advisory· Published Nov 19, 2024· Updated Apr 23, 2026

CVE-2024-51913

CVE-2024-51913

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mapme Mapme mapme allows Stored XSS.This issue affects Mapme: from n/a through <= 1.3.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS vulnerability in WordPress Mapme plugin up to 1.3.2 allows attackers to inject malicious scripts via improper input neutralization.

Vulnerability

Overview

The Mapme plugin for WordPress, versions up to and including 1.3.2, contains a stored cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw allows an attacker to inject arbitrary HTML and JavaScript code that is stored on the server and executed when other users view the affected page.

Exploitation

Details

Exploitation requires a privileged user (e.g., an editor or administrator) to perform an action such as clicking a malicious link, visiting a crafted page, or submitting a specially crafted form [1]. The attacker does not need direct access to the site but must convince a user with the necessary privileges to trigger the payload. The vulnerability is classified as stored XSS, meaning the injected script persists and affects all visitors to the compromised page.

Impact

Successful exploitation allows an attacker to execute arbitrary scripts in the context of the victim's browser. This can be used to redirect users to malicious sites, display advertisements, steal session cookies, or perform other actions that compromise the integrity and confidentiality of the website and its visitors [1]. The CVSS v3 base score is 6.5 (Medium), reflecting the need for user interaction and the potential for widespread impact.

Mitigation

The vendor has not released a patched version as of the publication date. Users are strongly advised to update the plugin immediately if a fix becomes available. If updating is not possible, website administrators should consider disabling the plugin or implementing a web application firewall (WAF) to block malicious payloads [1]. Given that such vulnerabilities are often targeted in mass-exploit campaigns, prompt action is recommended.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.