Skip to main content

CVE-2021-38328: CWE-79 Cross-site Scripting (XSS) in Notices Notices

Medium
VulnerabilityCVE-2021-38328cvecve-2021-38328cwe-79
Published: Fri Sep 10 2021 (09/10/2021, 13:33:35 UTC)
Source: CVE
Vendor/Project: Notices
Product: Notices

Description

The Notices WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/notices.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 6.1.

AI-Powered Analysis

AILast updated: 06/26/2025, 04:01:12 UTC

Technical Analysis

CVE-2021-38328 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Notices WordPress plugin, specifically affecting versions up to and including 6.1. The vulnerability arises from improper handling of the $_SERVER["PHP_SELF"] variable in the ~/notices.php file. This variable, which contains the filename of the currently executing script, is reflected back into the web page without adequate sanitization or encoding. An attacker can craft a malicious URL that injects arbitrary JavaScript code into the PHP_SELF parameter. When a victim visits this URL, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or other malicious actions. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating that the attack can be performed remotely over the network without privileges but requires user interaction (clicking a crafted link). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component, and it impacts confidentiality and integrity to a limited extent but does not affect availability. No known exploits have been reported in the wild, and no official patches or updates are linked in the provided data. The vulnerability affects the Notices plugin, which is a WordPress plugin used to display administrative notices or messages within WordPress dashboards or front-end pages. Given the nature of WordPress plugins and their widespread use, this vulnerability could be leveraged in targeted phishing or social engineering campaigns to compromise user sessions or inject malicious content into trusted websites.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the extent of Notices plugin deployment within their WordPress environments. Organizations using the affected plugin version may face risks of session hijacking, unauthorized actions performed on behalf of users, or data leakage through injected scripts. This can lead to compromised user accounts, defacement of websites, or distribution of malware to site visitors. Particularly, organizations in sectors with high reliance on WordPress for public-facing or internal portals—such as media, education, government, and SMEs—may experience reputational damage and potential regulatory scrutiny under GDPR if personal data is exposed. The vulnerability's requirement for user interaction (clicking a malicious link) means that phishing or social engineering campaigns could be used to exploit it, increasing the risk to employees and customers. However, the absence of known exploits in the wild and the medium severity rating suggest that while the threat is real, it is not currently widespread or critical. Nonetheless, the scope change (S:C) indicates that the vulnerability could affect other components or user sessions beyond the plugin itself, amplifying potential impact if exploited.

Mitigation Recommendations

1. Immediate upgrade or patching: Although no official patch links are provided, organizations should check for updates from the Notices plugin developer or WordPress plugin repository and apply any available security patches promptly. 2. Input sanitization: Developers or site administrators with custom modifications should ensure that the PHP_SELF variable and any reflected inputs are properly sanitized and encoded using functions like htmlspecialchars() to neutralize injected scripts. 3. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block suspicious requests containing script payloads targeting the PHP_SELF parameter or the notices.php endpoint. 4. User awareness training: Educate users and administrators about the risks of clicking unknown or suspicious links, as exploitation requires user interaction. 5. Plugin usage review: Evaluate the necessity of the Notices plugin; if it is not critical, consider disabling or replacing it with a more secure alternative. 6. Monitoring and logging: Implement enhanced monitoring of web server logs and WordPress activity logs to detect unusual access patterns or attempts to exploit this vulnerability. 7. Content Security Policy (CSP): Implement CSP headers to restrict the execution of unauthorized scripts, mitigating the impact of potential XSS payloads. 8. Segmentation and least privilege: Limit the exposure of WordPress admin interfaces to trusted networks or VPNs to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb93d

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:01:12 AM

Last updated: 8/15/2025, 8:50:03 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats