Files
CVEs-PoC/2012/CVE-2012-10018.md
T
2025-09-29 21:09:30 +02:00

22 lines
1.1 KiB
Markdown

### [CVE-2012-10018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10018)
![](https://img.shields.io/static/v1?label=Product&message=Mapplic%20-%20Custom%20Interactive%20Map%20WordPress%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Mapplic%20Lite&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&color=brightgreen)
### Description
The Mapplic and Mapplic Lite plugins for WordPress are vulnerable to Server-Side Request Forgery in versions up to, and including 6.1, 1.0 respectively. This makes it possible for attackers to forgery requests coming from a vulnerable site's server and ultimately perform an XSS attack if requesting an SVG file.
### POC
#### Reference
- https://packetstormsecurity.com/files/161919/
- https://packetstormsecurity.com/files/161920/
#### Github
- https://github.com/20142995/nuclei-templates
- https://github.com/cyb3r-w0lf/nuclei-template-collection