Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 02 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cyberhobo
Cyberhobo geo Mashup Wordpress Wordpress wordpress |
|
| Vendors & Products |
Cyberhobo
Cyberhobo geo Mashup Wordpress Wordpress wordpress |
Sat, 02 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'map_post_type' parameter in all versions up to, and including, 1.13.18. This is due to the `SearchResults` hook explicitly calling `stripslashes_deep($_POST)` which removes WordPress magic quotes protection, followed by the unsanitized `map_post_type` value being concatenated into an `IN(...)` clause without `esc_sql()` or `$wpdb->prepare()`. The 'any' branch of the same code correctly applies `array_map('esc_sql', ...)`, but the else branch does not. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database via a time-based blind approach. Exploitation requires the Geo Search feature to be enabled in plugin settings. | |
| Title | Geo Mashup <= 1.13.18 - Unauthenticated Time-Based SQL Injection via 'map_post_type' Parameter | |
| Weaknesses | CWE-89 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-04T14:58:15.863Z
Reserved: 2026-03-12T17:28:38.631Z
Link: CVE-2026-4061
Updated: 2026-05-04T14:58:09.944Z
Status : Deferred
Published: 2026-05-02T12:16:16.200
Modified: 2026-05-05T19:15:34.330
Link: CVE-2026-4061
No data.
OpenCVE Enrichment
Updated: 2026-05-02T12:30:27Z