CVE-2021-38319: CWE-79 Cross-site Scripting (XSS) in More From Google More From Google
The More From Google WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/morefromgoogle.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.2.
AI Analysis
Technical Summary
CVE-2021-38319 is a Reflected Cross-Site Scripting (XSS) vulnerability affecting the More From Google WordPress plugin, specifically version 0.0.2 and earlier. The vulnerability arises from improper handling of the $_SERVER["PHP_SELF"] variable in the morefromgoogle.php file. This variable reflects the current script's filename and path, which can be manipulated by an attacker to inject arbitrary JavaScript code. When a victim visits a crafted URL containing malicious script code embedded in the PHP_SELF value, the plugin reflects this input back in the HTTP response without proper sanitization or encoding, enabling execution of the injected script in the victim's browser context. This type of vulnerability is classified under CWE-79 and is considered a medium severity issue with a CVSS 3.1 score of 6.1. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, and it impacts confidentiality and integrity to a limited extent but does not affect availability. No known exploits are reported in the wild, and no official patches are listed, indicating that users of the plugin should exercise caution and consider mitigation steps. The vulnerability is particularly relevant for websites using this plugin, which is a niche WordPress extension, and attackers could leverage this XSS flaw to steal session cookies, perform actions on behalf of authenticated users, or conduct phishing attacks within the context of the vulnerable site.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the adoption of the More From Google WordPress plugin. Organizations running WordPress sites with this plugin are at risk of targeted attacks that exploit the XSS flaw to compromise user sessions, steal sensitive data, or manipulate website content. This can lead to reputational damage, loss of user trust, and potential data breaches involving personal data protected under GDPR. Since the vulnerability allows scope change, attackers may escalate the impact beyond the plugin itself, potentially affecting other parts of the website or integrated systems. The requirement for user interaction means phishing or social engineering campaigns could be used to lure users into clicking malicious links. While the vulnerability does not directly impact availability, the indirect consequences such as defacement or unauthorized actions could disrupt business operations. Given the medium severity, organizations should prioritize remediation especially if the plugin is used on customer-facing or critical websites.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediately auditing WordPress sites to identify installations of the More From Google plugin, particularly version 0.0.2 or earlier. 2) If possible, remove or disable the plugin until a patched version is available. 3) Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the PHP_SELF parameter or suspicious URL patterns. 4) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 5) Educate site administrators and users about the risks of clicking suspicious links to reduce successful phishing attempts. 6) Monitor web server logs for unusual requests containing script tags or encoded payloads in URLs. 7) If custom development is feasible, sanitize and encode all reflected inputs, especially those derived from PHP_SELF, to prevent script injection. 8) Stay updated with vendor announcements for official patches or updates addressing this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-38319: CWE-79 Cross-site Scripting (XSS) in More From Google More From Google
Description
The More From Google WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/morefromgoogle.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.2.
AI-Powered Analysis
Technical Analysis
CVE-2021-38319 is a Reflected Cross-Site Scripting (XSS) vulnerability affecting the More From Google WordPress plugin, specifically version 0.0.2 and earlier. The vulnerability arises from improper handling of the $_SERVER["PHP_SELF"] variable in the morefromgoogle.php file. This variable reflects the current script's filename and path, which can be manipulated by an attacker to inject arbitrary JavaScript code. When a victim visits a crafted URL containing malicious script code embedded in the PHP_SELF value, the plugin reflects this input back in the HTTP response without proper sanitization or encoding, enabling execution of the injected script in the victim's browser context. This type of vulnerability is classified under CWE-79 and is considered a medium severity issue with a CVSS 3.1 score of 6.1. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, and it impacts confidentiality and integrity to a limited extent but does not affect availability. No known exploits are reported in the wild, and no official patches are listed, indicating that users of the plugin should exercise caution and consider mitigation steps. The vulnerability is particularly relevant for websites using this plugin, which is a niche WordPress extension, and attackers could leverage this XSS flaw to steal session cookies, perform actions on behalf of authenticated users, or conduct phishing attacks within the context of the vulnerable site.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the adoption of the More From Google WordPress plugin. Organizations running WordPress sites with this plugin are at risk of targeted attacks that exploit the XSS flaw to compromise user sessions, steal sensitive data, or manipulate website content. This can lead to reputational damage, loss of user trust, and potential data breaches involving personal data protected under GDPR. Since the vulnerability allows scope change, attackers may escalate the impact beyond the plugin itself, potentially affecting other parts of the website or integrated systems. The requirement for user interaction means phishing or social engineering campaigns could be used to lure users into clicking malicious links. While the vulnerability does not directly impact availability, the indirect consequences such as defacement or unauthorized actions could disrupt business operations. Given the medium severity, organizations should prioritize remediation especially if the plugin is used on customer-facing or critical websites.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediately auditing WordPress sites to identify installations of the More From Google plugin, particularly version 0.0.2 or earlier. 2) If possible, remove or disable the plugin until a patched version is available. 3) Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the PHP_SELF parameter or suspicious URL patterns. 4) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 5) Educate site administrators and users about the risks of clicking suspicious links to reduce successful phishing attempts. 6) Monitor web server logs for unusual requests containing script tags or encoded payloads in URLs. 7) If custom development is feasible, sanitize and encode all reflected inputs, especially those derived from PHP_SELF, to prevent script injection. 8) Stay updated with vendor announcements for official patches or updates addressing this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-08-09T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbbe5
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 10:41:00 PM
Last updated: 8/5/2025, 2:46:17 AM
Views: 18
Related Threats
CVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumCVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.