Input validation vulnerability in Map Block Leaflet 3.2.1

A plugin called Map Block Leaflet used in WordPress has a security issue where it is possible for attackers to inject harmful scripts into pages. This can happen when someone with a Contributor-level or higher access to the site uses the ‘url’ parameter. This vulnerability exists in all versions up to and including 3.2.1 because the plugin does not properly filter and protect the input and output of the ‘url’ parameter.

Detected in:

Map Block Leaflet fixed vulnerable versions: >= * <= 3.2.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.