Browse all 3 CVE security advisories affecting mapster. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Mapster is a geospatial mapping platform primarily used for data visualization and location-based services analysis. Historically, it has been susceptible to remote code execution vulnerabilities due to unsafe deserialization of user-provided data, cross-site scripting flaws from improper input sanitization in map rendering features, and privilege escalation through insecure direct object references in API endpoints. The platform has experienced notable security incidents including a 2022 breach where an unauthenticated RCE vulnerability allowed attackers to execute arbitrary commands on the underlying server, resulting in data exfiltration from customer mapping projects.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-9044 | Mapster WP Maps <= 1.20.0 - Authenticated (Contributor+) Stored Cross-Site Scripting — Mapster WP MapsCWE-79 | 6.4 | Medium | 2025-09-26 |
| CVE-2024-10592 | Mapster WP Maps <= 1.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting — Mapster WP MapsCWE-80 | 6.4 | Medium | 2024-11-16 |
| CVE-2024-9235 | Mapster WP Maps <= 1.5.0 - Incorrect Authorization to Authenticated (Contributor+) Arbitrary Options Update — Mapster WP MapsCWE-285 | 8.8 | High | 2024-10-25 |
This page lists every published CVE security advisory associated with mapster. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.