VYPR
High severity7.1NVD Advisory· Published Feb 20, 2026· Updated Apr 15, 2026

CVE-2025-67990

CVE-2025-67990

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RealMag777 GMap Targeting gmap-targeting allows Reflected XSS.This issue affects GMap Targeting: from n/a through <= 1.1.7.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in GMap Targeting plugin (≤1.1.7) allows script injection via improper input neutralization.

Vulnerability

Overview

The GMap Targeting plugin for WordPress, versions up to and including 1.1.7, contains a reflected cross-site scripting (XSS) vulnerability due to improper neutralization of user input during web page generation [1]. This means the plugin fails to sanitize or escape certain parameters before including them in output, allowing an attacker to inject arbitrary HTML and JavaScript code.

Exploitation

Details

Exploitation requires user interaction—a privileged user (such as an administrator) must click a crafted link, visit a specially prepared page, or submit a malicious form [1] a malicious form. The attack does not require authentication for the initial delivery, but the victim must be logged into WordPress with sufficient privileges for the injected script to execute in the context of their session. This makes the vulnerability suitable for mass-exploit campaigns targeting thousands of sites [1].

Impact

Successful exploitation allows an attacker to inject malicious scripts that can perform actions such as redirecting visitors to attacker-controlled sites, displaying unauthorized advertisements, or delivering other HTML payloads [1]. The injected code executes in the browser of any user visiting the affected page, potentially leading to data theft, defacement, or further compromise of the WordPress installation.

Mitigation

The vulnerability has been patched in version 1.1.8 of the plugin [1]. Users are strongly advised to update immediately. For those unable to update, Patchstack provides a mitigation rule that blocks attacks until the update can be applied [1]. Given the moderate severity (CVSS 7.1) and the expectation that this vulnerability will be actively exploited, prompt action is recommended.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.