CVE-2026-5451
Description
The Extensions for Leaflet Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'elevation-track' shortcode in all versions up to, and including, 4.14. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS via the elevation-track shortcode in Extensions for Leaflet Map <=4.14, exploitable by authenticated Contributors+.
Vulnerability
Details
The Extensions for Leaflet Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) in all versions up to and including 4.14. The flaw resides in the 'elevation-track' shortcode, where user-supplied attributes are not properly sanitized or escaped before being stored and later rendered. This insufficient input handling allows the injection of arbitrary JavaScript or HTML into page content [1].
Exploitation
Prerequisites
An attacker must have at least Contributor-level access to the WordPress site (i.e., an authenticated user with the ability to publish or edit posts/pages). The attacker then inserts a crafted 'elevation-track' shortcode with malicious payloads into an attribute. No special network position or administrative privileges are required; the injection occurs when the content is saved and later viewed by another user [1].
Impact
When a victim — typically a site visitor or other user — accesses a page containing the injected shortcode, the attacker's script executes in the context of the victim's browser. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. The impact is amplified because the injected script runs automatically without user interaction, affecting any role that visits the compromised page [1].
Mitigation
The vendor has not released a patched version as of the publication date; users are advised to upgrade once available. No workarounds are documented, but limiting Contributor-level user trust and auditing shortcode usage can reduce risk. This CVE is not currently listed in CISA's Known Exploited Vulnerabilities (KEV) catalog [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- plugins.trac.wordpress.org/browser/extensions-leaflet-map/tags/4.11/php/functions.phpnvd
- plugins.trac.wordpress.org/browser/extensions-leaflet-map/tags/4.11/php/multielevation.phpnvd
- plugins.trac.wordpress.org/browser/extensions-leaflet-map/tags/4.15/php/functions.phpnvd
- plugins.trac.wordpress.org/browser/extensions-leaflet-map/tags/4.15/php/multielevation.phpnvd
- wordpress.org/plugins/extensions-leaflet-mapnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/7749c45a-f956-4df6-98d0-5ec0db95185envd
News mentions
1- Wordfence Intelligence Weekly WordPress Vulnerability Report (March 30, 2026 to April 5, 2026)Wordfence Blog · Apr 9, 2026