CVE-2021-38337
WordPress vulnerability analysis and mitigation

Overview

The RSVPMaker Excel WordPress plugin was found to contain a Reflected Cross-Site Scripting vulnerability (CVE-2021-38337) affecting versions up to and including 1.1. The vulnerability was discovered in September 2021 and stems from a reflected $SERVER["PHPSELF"] value in the ~/phpexcel/PHPExcel/Shared/JAMA/docs/download.php file (NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 6.1 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. Under CVSS v2.0, it received a base score of 4.3 (Medium) with vector (AV:N/AC:M/Au:N/C:N/I:P/A:N). The vulnerability is classified as CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (NVD).

Impact

The vulnerability allows attackers to inject arbitrary web scripts into the application. When successfully exploited, this could lead to theft of sensitive information, session hijacking, or other malicious actions performed in the context of the affected user's browser (NVD).

Mitigation and workarounds

Users should upgrade to a version newer than 1.1 of the RSVPMaker Excel WordPress plugin. If upgrading is not immediately possible, it is recommended to implement additional security controls to filter and validate user input, particularly in areas handling $SERVER["PHPSELF"] values (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management