CVE-2026-4061: Geo Mashup WordPress Plugin SQL Injection
The Geo Mashup plugin for WordPress, in all versions up to and including 1.13.18, is vulnerable to time-based SQL injection. The National Vulnerability Database reports this flaw, identified as CVE-2026-4061, stems from improper sanitization of the map_post_type parameter. Specifically, the SearchResults hook explicitly calls stripslashes_deep($_POST), bypassing WordPress’s magic quotes protection. Subsequently, the unsanitized map_post_type value is directly concatenated into an IN(...) SQL clause without using esc_sql() or $wpdb->prepare().
This oversight allows unauthenticated attackers to inject malicious SQL queries. By leveraging a time-based blind approach, they can extract sensitive information from the database. The National Vulnerability Database notes that exploitation is contingent on the Geo Search feature being enabled within the plugin settings. The vulnerability carries a CVSS score of 7.5 (High severity).
This is a fundamental failure in input validation, exacerbated by explicitly removing built-in protections. For defenders, it’s a stark reminder that even seemingly innocuous plugin parameters can harbor critical vulnerabilities when developers misunderstand or bypass core security functions. Attackers constantly probe for these exact scenarios, where a simple URL parameter can lead to full database compromise.
What This Means For You
- If your organization uses the Geo Mashup plugin for WordPress, you are exposed. Check your plugin version immediately. If Geo Search is enabled, assume you are at high risk. Unauthenticated SQL injection is a direct path to data exfiltration. Patch or disable this plugin without delay. Audit logs for any suspicious activity related to the Geo Mashup plugin, especially around the `map_post_type` parameter.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-4061: Geo Mashup WordPress Plugin SQL Injection via map_post_type
title: CVE-2026-4061: Geo Mashup WordPress Plugin SQL Injection via map_post_type
id: scw-2026-05-02-ai-1
status: experimental
level: critical
description: |
Detects a time-based SQL injection attempt targeting the Geo Mashup WordPress plugin (CVE-2026-4061). This rule specifically looks for POST requests to 'admin-ajax.php' with the 'geoMashup_search' action and a payload containing a time-based SQL injection pattern in the 'map_post_type' parameter, indicating an attempt to exploit the vulnerability.
author: SCW Feed Engine (AI-generated)
date: 2026-05-02
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-4061/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/wp-admin/admin-ajax.php'
cs-method|exact:
- 'POST'
cs-uri-query|contains:
- 'action=geoMashup_search'
selection_post_data:
query|contains:
- "map_post_type=(SELECT * FROM (SELECT(SLEEP(5)))a)"
condition: selection AND selection_post_data
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-4061 | SQLi | Geo Mashup plugin for WordPress versions <= 1.13.18 |
| CVE-2026-4061 | SQLi | Vulnerable parameter: 'map_post_type' |
| CVE-2026-4061 | SQLi | Vulnerable component: `SearchResults` hook |
| CVE-2026-4061 | SQLi | Attack vector: Time-Based Blind SQL Injection |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 02, 2026 at 15:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.