Skip to main content

CVE-2021-38319: CWE-79 Cross-site Scripting (XSS) in More From Google More From Google

Medium
VulnerabilityCVE-2021-38319cvecve-2021-38319cwe-79
Published: Thu Sep 09 2021 (09/09/2021, 18:10:25 UTC)
Source: CVE
Vendor/Project: More From Google
Product: More From Google

Description

The More From Google WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/morefromgoogle.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.2.

AI-Powered Analysis

AILast updated: 07/06/2025, 22:41:00 UTC

Technical Analysis

CVE-2021-38319 is a Reflected Cross-Site Scripting (XSS) vulnerability affecting the More From Google WordPress plugin, specifically version 0.0.2 and earlier. The vulnerability arises from improper handling of the $_SERVER["PHP_SELF"] variable in the morefromgoogle.php file. This variable reflects the current script's filename and path, which can be manipulated by an attacker to inject arbitrary JavaScript code. When a victim visits a crafted URL containing malicious script code embedded in the PHP_SELF value, the plugin reflects this input back in the HTTP response without proper sanitization or encoding, enabling execution of the injected script in the victim's browser context. This type of vulnerability is classified under CWE-79 and is considered a medium severity issue with a CVSS 3.1 score of 6.1. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, and it impacts confidentiality and integrity to a limited extent but does not affect availability. No known exploits are reported in the wild, and no official patches are listed, indicating that users of the plugin should exercise caution and consider mitigation steps. The vulnerability is particularly relevant for websites using this plugin, which is a niche WordPress extension, and attackers could leverage this XSS flaw to steal session cookies, perform actions on behalf of authenticated users, or conduct phishing attacks within the context of the vulnerable site.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the adoption of the More From Google WordPress plugin. Organizations running WordPress sites with this plugin are at risk of targeted attacks that exploit the XSS flaw to compromise user sessions, steal sensitive data, or manipulate website content. This can lead to reputational damage, loss of user trust, and potential data breaches involving personal data protected under GDPR. Since the vulnerability allows scope change, attackers may escalate the impact beyond the plugin itself, potentially affecting other parts of the website or integrated systems. The requirement for user interaction means phishing or social engineering campaigns could be used to lure users into clicking malicious links. While the vulnerability does not directly impact availability, the indirect consequences such as defacement or unauthorized actions could disrupt business operations. Given the medium severity, organizations should prioritize remediation especially if the plugin is used on customer-facing or critical websites.

Mitigation Recommendations

Specific mitigation steps include: 1) Immediately auditing WordPress sites to identify installations of the More From Google plugin, particularly version 0.0.2 or earlier. 2) If possible, remove or disable the plugin until a patched version is available. 3) Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the PHP_SELF parameter or suspicious URL patterns. 4) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 5) Educate site administrators and users about the risks of clicking suspicious links to reduce successful phishing attempts. 6) Monitor web server logs for unusual requests containing script tags or encoded payloads in URLs. 7) If custom development is feasible, sanitize and encode all reflected inputs, especially those derived from PHP_SELF, to prevent script injection. 8) Stay updated with vendor announcements for official patches or updates addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbbe5

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 10:41:00 PM

Last updated: 8/5/2025, 2:46:17 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats