|
[Japanese]
|
JVNDB-2026-000045
|
WordPress Plugin "OpenStreetMap" vulnerable to cross-site scripting
|
WordPress Plugin "OpenStreetMap" provided by MiKa contains the following vulnerability.- Cross-site scripting (CWE-79) - CVE-2026-33559
Naoya Takahashi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 5.4 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Changed
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
|
CVSS v4 Severity
Base Metrics: 5.1 (Medium) [IPA Score]
- Access Vector (AV): Network
- Attack Complexity (AC): Low
- Attack Requirements (AT): None
- Privileges Required (PR): Low
- User Interaction (UI): Passive
Vulnerable System Impact
- Confidentiality Impact (VC): None
- Integrity Impact (VI): None
- Availability Impact (VA): None
Subsequent System Impact
- Confidentiality Impact (SC): Low
- Integrity Impact (SI): Low
- Availability Impact (SA): None
|
|
MiKa
- OSM - OpenStreetMap versions prior to 6.1.15
|
|
On the site with the affected version of the plugin enabled, a logged-in user with a page-creating/editing privilege can embed some malicious script with a crafted HTTP request.
When a victim user accesses this page, the script may be executed in the user's web browser.
|
[Update the Software]
Update the software to the latest version according to the information provided by the developer.
|
MiKa
|
- Cross-site Scripting(CWE-79) [IPA Evaluation]
|
- CVE-2026-33559
|
- JVN : JVN#48058823
|
- [2026/03/27]
Web page was published
|