### [CVE-2012-10018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10018) ![](https://img.shields.io/static/v1?label=Product&message=Mapplic%20-%20Custom%20Interactive%20Map%20WordPress%20Plugin&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Mapplic%20Lite&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&color=brightgreen) ### Description The Mapplic and Mapplic Lite plugins for WordPress are vulnerable to Server-Side Request Forgery in versions up to, and including 6.1, 1.0 respectively. This makes it possible for attackers to forgery requests coming from a vulnerable site's server and ultimately perform an XSS attack if requesting an SVG file. ### POC #### Reference - https://packetstormsecurity.com/files/161919/ - https://packetstormsecurity.com/files/161920/ #### Github - https://github.com/20142995/nuclei-templates - https://github.com/cyb3r-w0lf/nuclei-template-collection