The User Activation Email WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the uae-key parameter found in the ~/user-activation-email.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.0.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/user-activation-email/tags/1.3.0/user-activation-email.php#L191 | Exploit Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38325 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2021-09-08T00:00:00
Updated: 2021-09-09T18:10:32
Reserved: 2021-08-09T00:00:00
Link: CVE-2021-38325
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-09-09T19:15:14.150
Modified: 2021-09-22T19:41:29.757
Link: CVE-2021-38325
JSON object: View
Redhat Information
No data.
CWE