{"containers":{"cna":{"affected":[{"product":"Maps Plugin using Google Maps for WordPress – WP Google Map","vendor":"Unknown","versions":[{"lessThan":"1.8.4","status":"affected","version":"1.8.4","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Krzysztof Zając"}],"descriptions":[{"lang":"en","value":"The Maps Plugin using Google Maps for WordPress plugin before 1.8.4 does not have CSRF checks in most of its AJAX actions, which could allow attackers to make logged in admins delete arbitrary posts and update the plugin's settings via a CSRF attack"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-02-28T09:06:35.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/f85cf258-1c2f-444e-91e5-b1fc55880f0e"},{"tags":["x_refsource_CONFIRM"],"url":"https://plugins.trac.wordpress.org/changeset/2667376"}],"source":{"discovery":"EXTERNAL"},"title":"WP Google Map < 1.8.4 - Arbitrary Post Deletion and Plugin's Settings Update via CSRF","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-25081","STATE":"PUBLIC","TITLE":"WP Google Map < 1.8.4 - Arbitrary Post Deletion and Plugin's Settings Update via CSRF"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Maps Plugin using Google Maps for WordPress – WP Google Map","version":{"version_data":[{"version_affected":"<","version_name":"1.8.4","version_value":"1.8.4"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Krzysztof Zając"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Maps Plugin using Google Maps for WordPress plugin before 1.8.4 does not have CSRF checks in most of its AJAX actions, which could allow attackers to make logged in admins delete arbitrary posts and update the plugin's settings via a CSRF attack"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/f85cf258-1c2f-444e-91e5-b1fc55880f0e","refsource":"MISC","url":"https://wpscan.com/vulnerability/f85cf258-1c2f-444e-91e5-b1fc55880f0e"},{"name":"https://plugins.trac.wordpress.org/changeset/2667376","refsource":"CONFIRM","url":"https://plugins.trac.wordpress.org/changeset/2667376"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:56:10.996Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/f85cf258-1c2f-444e-91e5-b1fc55880f0e"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset/2667376"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-25081","datePublished":"2022-02-28T09:06:35.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:56:10.996Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}