Add CVE-2012-10018 detection template#14479
Add CVE-2012-10018 detection template#14479pussycat0x merged 11 commits intoprojectdiscovery:mainfrom
Conversation
- Use mapplic-mapdata parameter (raw JSON editor) instead of visual form fields - Inject complete JSON structure matching Packet Storm exploit - Detect stored URL in data-mapdata attribute - Verify mapplic-rawedit interface presence - Update description to clarify SSRF + XSS exploitation chain - Fix matchers to detect actual vulnerability manifestation
|
Hi @KrE80r i don't see any XSS being triggered, i request you to update the POC accordingly. |
Update HTTP template metadata
|
Thanks @DhiyaneshGeek for the feedback. You're right - the original template only proved URL injection, not actual XSS execution. I've added:
To test: The template references the SVG from raw.githubusercontent.com once merged, making it plug-and-play. |
|
Hi @KrE80r Kindly update the template only with HTTP protocol only and remove the headless Also add matcher for each of the request with |
|
@DhiyaneshGeek done updated the PR |
|
Hi @KrE80r Kindly use this as reference https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-1029.yaml you should be using Hope this helps |
|
thanks @DhiyaneshGeek added |
|
Hi @KrE80r
kindly update the same If the XSS is not triggered the submission will not be accepted Thanks |
- Replace cookie-reuse with flow control - Convert all matchers to DSL format - Add XSS payload detection in mapplic-mapdata field
|
Thank you @DhiyaneshGeek for the feedback. I've updated the template to:
Regarding XSS trigger detection: The original CVE describes a specific attack chain: an authenticated user injects an arbitrary URL pointing to a remote SVG file. When the map is viewed, jQuery To properly detect this vulnerability, the template would need to:
This requires headless mode since HTTP-only templates cannot simulate browser behavior (fetching external SVG, DOM insertion, script execution). The current HTTP-only template demonstrates stored XSS via the Question: Is there an acceptable approach for this CVE within HTTP-only constraints, or would a headless template be more appropriate here? I want to ensure the template accurately represents the vulnerability. |
|
Hi @KrE80r i have validated locally
|

/claim 14478
Summary
Adds nuclei template for detecting CVE-2012-10018 (WordPress Mapplic/Mapplic Lite Stored XSS via SVG file upload).
Vulnerable environment shared privately
Testing
Test Evidence
Validated against WordPress 5.5 + Mapplic Lite 1.0 in Docker environment (shared privately).