Description
The User Activation Email WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the uae-key parameter found in the ~/user-activation-email.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.0.
References
ExploitThird Party Advisory
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38325
ExploitThird Party Advisory
ExploitThird Party Advisory
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38325
ExploitThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2021-09-09T17:15:14.150Z
4 years agoLast modified
2024-11-21T05:16:48.703Z
1 year ago