{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2012-10018","assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","state":"PUBLISHED","assignerShortName":"Wordfence","dateReserved":"2024-10-15T17:59:31.519Z","datePublished":"2024-10-16T06:43:33.160Z","dateUpdated":"2026-04-08T16:55:12.362Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence","dateUpdated":"2026-04-08T16:55:12.362Z"},"affected":[{"vendor":"sekler","product":"Mapplic Lite","versions":[{"version":"0","status":"affected","lessThan":"1.0.1","versionType":"semver"}],"defaultStatus":"unaffected"},{"vendor":"sekler","product":"Mapplic - Custom Interactive Map WordPress Plugin","versions":[{"version":"0","status":"affected","lessThan":"6.2","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Mapplic and Mapplic Lite plugins for WordPress are vulnerable to Server-Side Request Forgery in versions up to, and including 6.1, 1.0 respectively. This makes it possible for attackers to forgery requests coming from a vulnerable site's server and ultimately perform an XSS attack if requesting an SVG file."}],"title":"Mapplic Lite and Mapplic <= (Various Versions) - Server Side Request Forgery to Cross-Site Scirpting","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/5aacabb5-94af-485a-af24-e84db3e3726f?source=cve"},{"url":"https://packetstormsecurity.com/files/161919/"},{"url":"https://packetstormsecurity.com/files/161920/"},{"url":"https://www.mapplic.com/docs/#changelog"},{"url":"https://plugins.trac.wordpress.org/changeset/2503447"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-918 Server-Side Request Forgery (SSRF)","cweId":"CWE-918","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L","baseScore":8.3,"baseSeverity":"HIGH"}}],"credits":[{"lang":"en","type":"finder","value":"Eagle Eye"}],"timeline":[{"time":"2012-03-23T00:00:00.000Z","lang":"en","value":"Disclosed"}]},"adp":[{"affected":[{"vendor":"mapplic","product":"mapplic","cpes":["cpe:2.3:a:mapplic:mapplic:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"6.2","versionType":"semver"}]},{"vendor":"mapplic","product":"mapplic_lite","cpes":["cpe:2.3:a:mapplic:mapplic_lite:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"1.0.1","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-16T17:55:14.671222Z","id":"CVE-2012-10018","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-16T18:05:36.335Z"}}]}}