REPORT / 01

Analysis Report · Folder Analysis cache/wp-google-street-view_1.1.8 → cache/wp-google-street-view_1.1.9 — CVE-2026-0563

Shared security patch analysis results

mode patchdiff ai claude_cli haiku
02 · Lifecycle actions cancel · resume · skip · regenerate
03 · Share this analysis copy link · embed report
03 · CVE Security Analysis & Writeups ai-generated · per cve

Comprehensive security analysis generated by AI for each confirmed CVE match. Click on a CVE to view the detailed writeup including vulnerability background, technical details, patch analysis, and PoC guide.

CVE-2026-0563 NVD
AI-Generated Analysis
05 · Findings filter · search · paginate
Use quotes for exact: "SQL injection" · Operators: hello AND bye, admin OR root, -error, NOT warning
Showing 0 to 0 of 0 results
admin/metabox.php AI: 1 vulnerabilities 1 true positive CVE-2026-0563
--- cache/wp-google-street-view_1.1.8/admin/metabox.php	2026-01-09 00:37:14.945197436 +0000+++ cache/wp-google-street-view_1.1.9/admin/metabox.php	2026-01-09 00:39:14.216456842 +0000@@ -71,7 +71,7 @@                  if ( in_array($key, WPGSV_Validate::$textarea) ) { -                    update_post_meta( $postid, $key, trim($value) );+                    update_post_meta( $postid, $key, wp_kses_post($value) );                  } 
AI Analysis
I'll analyze this security fix in the WordPress Google Street View plugin.

---

**Vulnerability Existed: yes**
TRUE POSITIVE

**Cross-Site Scripting (XSS) - CWE-79 - admin/metabox.php [Line 74]**

**Old Code:**
```php
update_post_meta( $postid, $key, trim($value) );
```

**Fixed Code:**
```php
update_post_meta( $postid, $key, wp_kses_post($value) );
```

**Explanation:**

The original code used only `trim()` on user-supplied textarea input before storing it as post metadata. This is insufficient sanitization for content that may be displayed in the WordPress admin or frontend. The `trim()` function only removes whitespace and does not prevent malicious HTML or JavaScript from being stored.

The fix applies `wp_kses_post()`, which is WordPress's standard function for sanitizing post content. This function:
1. Strips out dangerous HTML tags and attributes
2. Prevents inline JavaScript execution
3. Allows safe HTML tags commonly used in post content (like `<p>`, `<a>`, `<strong>`, etc.)

This fixes a **Stored XSS vulnerability** where an authenticated user (with permissions to edit posts using this metabox) could inject malicious JavaScript that would execute when the metadata is displayed in the admin panel or on the frontend, potentially affecting other users viewing that content.

The vulnerability severity depends on the intended use case of this textarea field - if it's meant to store HTML content, this is the appropriate sanitization function for that purpose.
CVE Analysis Results:
CVE-2026-0563: Yes
View CVE Description
The WP Google Street View (with 360° virtual tour) & Google maps + Local SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpgsv_map' shortcode in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Showing 1 to 1 of 1 results