Cyber Posture

CVE-2025-27278

High

Published: 03 March 2025

Published
03 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0021 42.8th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-27278 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the AcuGIS Leaflet Maps WordPress plugin (mapfig-premium-leaflet-map-maker) developed by David Ghedini. The issue affects all versions from n/a through 5.1.1.0 and was published on 2025-03-03.

The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating exploitation is possible by unauthenticated attackers over the network with low attack complexity, though it requires user interaction such as clicking a malicious link. Successful exploitation enables reflected XSS, allowing attackers to inject and execute arbitrary scripts in the context of the victim's browser, with low impacts on confidentiality, integrity, and availability within a changed scope.

Advisories, including the Patchstack database entry at https://patchstack.com/database/Wordpress/Plugin/mapfig-premium-leaflet-map-maker/vulnerability/wordpress-acugis-leaflet-maps-plugin-5-1-1-0-multiple-cross-site-scripting-xss-vulnerabilities?_s_id=cve, document the vulnerability and provide details on affected WordPress plugin versions for mitigation guidance.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Reflected XSS is directly exploited via malicious links (T1204.001) to inject and execute arbitrary JavaScript (T1059.007) in the victim's browser.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References