VYPR
Medium severity6.4NVD Advisory· Published Jul 18, 2025· Updated Apr 15, 2026

CVE-2025-7660

CVE-2025-7660

Description

The Map My Locations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'map_my_locations' shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Map My Locations WordPress plugin ≤1.1 has a stored XSS vulnerability via the 'map_my_locations' shortcode, allowing contributor-level users to inject arbitrary scripts.

The Map My Locations plugin for WordPress versions up to and including 1.1 is vulnerable to Stored Cross-Site Scripting (XSS) through its map_my_locations shortcode. The vulnerability stems from insufficient input sanitization and output escaping on user-supplied shortcode attributes. In the plugin's public-facing display function (display_map in class-map-my-locations-public.php), attributes such as title, map, style, list, orderby, pin_color, and id are accepted via the shortcode_atts function [1]. These attributes are then processed and rendered by the map-my-locations-public-display.php partial, which outputs attribute values without adequate escaping, allowing malicious HTML or JavaScript to be stored [2].

An attacker must have at least Contributor-level access to a WordPress site to exploit this flaw. By crafting a shortcode with malicious attribute values (e.g., an XSS payload in the title attribute), the attacker can inject arbitrary web scripts. When an administrator or other user views a page or post containing that shortcode, the injected script executes in the context of the victim's browser session, because the stored payload is rendered by the front-end display template without proper sanitization [1][2].

Successful exploitation enables the attacker to perform actions such as session hijacking, defacement, or redirecting users to malicious sites. The vulnerability has a CVSS v3 base score of 6.4 (Medium), reflecting the requirement for authenticated access and the need for user interaction (viewing the compromised page) [description]. At the time of publication, users should upgrade to version 1.1.1 or later, which patches the input sanitization and output escaping weaknesses in the shortcode handler.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.