CVE-2021-38323: CWE-79 Cross-site Scripting (XSS) in RentPress RentPress
The RentPress WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the selections parameter found in the ~/src/rentPress/AjaxRequests.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 6.6.4.
AI Analysis
Technical Summary
CVE-2021-38323 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the RentPress WordPress plugin, specifically affecting versions up to and including 6.6.4. The vulnerability arises from improper sanitization of the 'selections' parameter in the ~/src/rentPress/AjaxRequests.php file. This flaw allows an attacker to inject arbitrary malicious scripts into web pages viewed by other users. When a victim accesses a crafted URL containing the malicious payload in the 'selections' parameter, the injected script executes in the context of the victim's browser. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1 (medium severity), with the vector indicating that the attack can be launched remotely (AV:N) without privileges (PR:N), requires user interaction (UI:R), and impacts confidentiality and integrity with a scope change (S:C). No known exploits are reported in the wild, but the vulnerability remains a risk for unpatched systems. The plugin is commonly used by property rental websites built on WordPress, which may have diverse user bases and handle sensitive user data.
Potential Impact
For European organizations using the RentPress plugin on their WordPress sites, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of user information, including personally identifiable information (PII) or session tokens, potentially violating GDPR requirements. Attackers could also manipulate site content or redirect users to phishing or malware sites, damaging brand reputation and trust. Since the vulnerability requires user interaction, the impact depends on the ability to lure users into clicking malicious links. However, the scope change in the CVSS vector indicates that the attack could affect resources beyond the vulnerable component, potentially impacting other parts of the web application. Organizations in sectors such as real estate, property management, and housing services in Europe could be targeted, especially those with high web traffic or sensitive client data. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time.
Mitigation Recommendations
European organizations should prioritize updating the RentPress plugin to a version beyond 6.6.4 where this vulnerability is patched. If an update is not immediately available, implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'selections' parameter. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters processed via AJAX requests. Educate users and administrators about phishing risks to reduce the likelihood of successful social engineering attacks exploiting this vulnerability. Regularly audit WordPress plugins for vulnerabilities and maintain an inventory to ensure timely patching. Additionally, monitor web server logs for suspicious requests containing unusual script tags or encoded payloads targeting the vulnerable parameter.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2021-38323: CWE-79 Cross-site Scripting (XSS) in RentPress RentPress
Description
The RentPress WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the selections parameter found in the ~/src/rentPress/AjaxRequests.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 6.6.4.
AI-Powered Analysis
Technical Analysis
CVE-2021-38323 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the RentPress WordPress plugin, specifically affecting versions up to and including 6.6.4. The vulnerability arises from improper sanitization of the 'selections' parameter in the ~/src/rentPress/AjaxRequests.php file. This flaw allows an attacker to inject arbitrary malicious scripts into web pages viewed by other users. When a victim accesses a crafted URL containing the malicious payload in the 'selections' parameter, the injected script executes in the context of the victim's browser. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1 (medium severity), with the vector indicating that the attack can be launched remotely (AV:N) without privileges (PR:N), requires user interaction (UI:R), and impacts confidentiality and integrity with a scope change (S:C). No known exploits are reported in the wild, but the vulnerability remains a risk for unpatched systems. The plugin is commonly used by property rental websites built on WordPress, which may have diverse user bases and handle sensitive user data.
Potential Impact
For European organizations using the RentPress plugin on their WordPress sites, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of user information, including personally identifiable information (PII) or session tokens, potentially violating GDPR requirements. Attackers could also manipulate site content or redirect users to phishing or malware sites, damaging brand reputation and trust. Since the vulnerability requires user interaction, the impact depends on the ability to lure users into clicking malicious links. However, the scope change in the CVSS vector indicates that the attack could affect resources beyond the vulnerable component, potentially impacting other parts of the web application. Organizations in sectors such as real estate, property management, and housing services in Europe could be targeted, especially those with high web traffic or sensitive client data. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time.
Mitigation Recommendations
European organizations should prioritize updating the RentPress plugin to a version beyond 6.6.4 where this vulnerability is patched. If an update is not immediately available, implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'selections' parameter. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters processed via AJAX requests. Educate users and administrators about phishing risks to reduce the likelihood of successful social engineering attacks exploiting this vulnerability. Regularly audit WordPress plugins for vulnerabilities and maintain an inventory to ensure timely patching. Additionally, monitor web server logs for suspicious requests containing unusual script tags or encoded payloads targeting the vulnerable parameter.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-08-09T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc998
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 1:11:56 AM
Last updated: 8/6/2025, 6:22:38 PM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.