CVE-2025-23518
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mrsaucier GoogleMapper googlemapper-2 allows Reflected XSS.This issue affects GoogleMapper: from n/a through <= 2.0.3.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS in GoogleMapper WordPress plugin up to version 2.0.3 allows attackers to inject malicious scripts via crafted requests.
The vulnerability is a Reflected Cross-Site Scripting (XSS) issue in the GoogleMapper WordPress plugin, affecting versions through 2.0.3. The plugin fails to properly neutralize input during web page generation, allowing injection of arbitrary HTML and JavaScript [1].
Exploitation requires user interaction: an attacker must trick a privileged user (e.g., administrator) into clicking a malicious link, visiting a crafted page, or submitting a form. The attack can be initiated by any role with access to the vulnerable parameter, but successful execution depends on the victim's action [1].
A successful attack allows the attacker to inject malicious scripts, which execute when other users (including regular visitors) access the site. This can lead to redirects, advertisements, or other harmful payloads. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns against thousands of websites [1].
Mitigation: The vendor has not released an official patch, but Patchstack offers a mitigation rule to block attacks until an update is available. Users are advised to update the plugin as soon as a patch is released, or contact their hosting provider for assistance [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.