VYPR
Medium severity6.5NVD Advisory· Published Nov 21, 2025· Updated Apr 15, 2026

CVE-2025-66093

CVE-2025-66093

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hupe13 Extensions for Leaflet Map extensions-leaflet-map allows DOM-Based XSS.This issue affects Extensions for Leaflet Map: from n/a through <= 4.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

DOM-Based XSS vulnerability in Extensions for Leaflet Map plugin (≤4.8) allows attackers to inject malicious scripts via crafted input.

Vulnerability

Overview The Extensions for Leaflet Map plugin for WordPress (versions through 4.8) contains a DOM-Based Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user input during web page generation. This flaw enables an attacker to inject arbitrary JavaScript code into the DOM, which is then executed in the browser of a victim visiting a crafted page.

Exploitation

Details Exploitation requires user interaction—a privileged user must perform an action such as clicking a malicious link, visiting a specially crafted page, or submitting a form. The attacker does not need direct network access to the server but can deliver the payload through any input that is reflected in the page. The vulnerability is classified as medium severity (CVSS 6.5) and is known to be targeted in mass-exploit campaigns.

Impact

Successful exploitation allows an attacker to execute arbitrary scripts in the context of the victim's browser. This can lead to session hijacking, redirection to malicious sites, injection of advertisements, or other HTML/JavaScript payloads that compromise the integrity of the vulnerable site.

Mitigation

The plugin developer has released version 4.9, which fixes the vulnerability. Users are strongly advised to update immediately. If updating is not possible, site administrators should apply additional security measures such as input validation or seek assistance from their hosting provider. Patchstack users can enable auto-updates for vulnerable plugins [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.