{"containers":{"cna":{"affected":[{"product":"Maps Plugin using Google Maps for WordPress – WP Google Map","vendor":"Unknown","versions":[{"lessThan":"1.8.1","status":"affected","version":"1.8.1","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Krzysztof Zając"}],"descriptions":[{"lang":"en","value":"The Maps Plugin using Google Maps for WordPress plugin before 1.8.1 does not have proper authorisation and CSRF in most of its AJAX actions, which could allow any authenticated users, such as subscriber to delete arbitrary posts and update the plugin's settings."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-862","description":"CWE-862 Missing Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-02-28T09:06:30.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/6639da0d-6d29-46c1-a3cc-5e5626305833"},{"tags":["x_refsource_CONFIRM"],"url":"https://plugins.trac.wordpress.org/changeset/2641450"}],"source":{"discovery":"EXTERNAL"},"title":"WP Google Map < 1.8.1 - Subscriber+ Arbitrary Post Deletion and Plugin's Settings Update","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-25011","STATE":"PUBLIC","TITLE":"WP Google Map < 1.8.1 - Subscriber+ Arbitrary Post Deletion and Plugin's Settings Update"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Maps Plugin using Google Maps for WordPress – WP Google Map","version":{"version_data":[{"version_affected":"<","version_name":"1.8.1","version_value":"1.8.1"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Krzysztof Zając"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Maps Plugin using Google Maps for WordPress plugin before 1.8.1 does not have proper authorisation and CSRF in most of its AJAX actions, which could allow any authenticated users, such as subscriber to delete arbitrary posts and update the plugin's settings."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-862 Missing Authorization"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/6639da0d-6d29-46c1-a3cc-5e5626305833","refsource":"MISC","url":"https://wpscan.com/vulnerability/6639da0d-6d29-46c1-a3cc-5e5626305833"},{"name":"https://plugins.trac.wordpress.org/changeset/2641450","refsource":"CONFIRM","url":"https://plugins.trac.wordpress.org/changeset/2641450"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:49:14.559Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/6639da0d-6d29-46c1-a3cc-5e5626305833"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset/2641450"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-25011","datePublished":"2022-02-28T09:06:30.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:49:14.559Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}