VYPR
Medium severity6.4OSV Advisory· Published Aug 19, 2025· Updated Apr 15, 2026

CVE-2025-8622

CVE-2025-8622

Description

The Flexible Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Flexible Maps shortcode in all versions up to, and including, 1.18.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated contributors can inject stored XSS via unsanitized shortcode attributes in the Flexible Map plugin up to version 1.18.0.

What the vulnerability is

The Flexible Map plugin for WordPress, up to and including version 1.18.0, fails to properly sanitize user-supplied attributes passed to the [flexiblemap] shortcode. Specifically, the plugin's custom str2js() function does not escape JavaScript context strings as securely as WordPress's built-in esc_js() function. This allows stored cross-site scripting (XSS) by injecting arbitrary JavaScript through attributes such as directions, zoomstyle, directionsfrom, maptype, maptypes, region, and locale [1][2].

How it is exploited

An attacker with contributor-level access or higher can create or edit a post/page containing the vulnerable shortcode and supply a malicious payload in any of the unsanitized attributes. When a site visitor views the affected page, the injected script executes within the context of that user's browser. No additional authentication is required on the part of the victim [1].

Impact

The attacker can perform actions such as stealing session cookies, redirecting users to malicious sites, defacing the page, or conducting other client-side attacks. Because the XSS is stored in the WordPress database, it persists until the malicious content is removed or the plugin is patched [1].

Mitigation

The vulnerability was addressed in the commit 1cbae2fa98e10c82d82a68e2bacfbdb7231117db by replacing the custom str2js() calls with WordPress's esc_js() function [2]. Users should update the Flexible Map plugin to version 1.18.1 or later, which contains this fix. No workaround is available for versions prior to the patch [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.