Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.4
YaMaps for WordPress plugin allows malicious scripts to run on any page
CVE-2025-14851
Summary
A security flaw in the YaMaps for WordPress plugin allows attackers with contributor-level access to inject malicious scripts on any page, which can be executed when users visit those pages. This can lead to unauthorized actions being performed on your website. To fix this, update the plugin to a version higher than 0.6.40.
Original title
The YaMaps for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `yamap` shortcode parameters in all versions up to, and including, 0.6.40 due to insufficient inpu...
Original description
The YaMaps for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `yamap` shortcode parameters in all versions up to, and including, 0.6.40 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
nvd CVSS3.1
6.4
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
- https://plugins.trac.wordpress.org/browser/yamaps/tags/0.6.40/includes/shortcode...
- https://plugins.trac.wordpress.org/browser/yamaps/tags/0.6.40/includes/shortcode...
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old...
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b0b84c2a-7297-4d96-8fa...
Published: 19 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026