Skip to main content

CVE-2021-38329: CWE-79 Cross-site Scripting (XSS) in DJ EmailPublish DJ EmailPublish

Medium
VulnerabilityCVE-2021-38329cvecve-2021-38329cwe-79
Published: Fri Sep 10 2021 (09/10/2021, 13:33:41 UTC)
Source: CVE
Vendor/Project: DJ EmailPublish
Product: DJ EmailPublish

Description

The DJ EmailPublish WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/dj-email-publish.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.7.2.

AI-Powered Analysis

AILast updated: 06/26/2025, 04:00:53 UTC

Technical Analysis

CVE-2021-38329 is a Reflected Cross-Site Scripting (XSS) vulnerability affecting the DJ EmailPublish WordPress plugin, specifically versions up to and including 1.7.2. The vulnerability arises from improper sanitization of the $_SERVER["PHP_SELF"] variable in the ~/dj-email-publish.php file. This variable reflects the current script's filename and path, which can be manipulated by an attacker to inject arbitrary JavaScript code. When a victim visits a crafted URL containing malicious script payloads, the injected code executes in their browser context. This can lead to session hijacking, credential theft, or other malicious actions performed on behalf of the victim. The vulnerability is classified under CWE-79, indicating a classic XSS flaw. The CVSS v3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No known public exploits have been reported, but the vulnerability is publicly disclosed and can be weaponized by attackers targeting vulnerable WordPress sites using this plugin. Since WordPress is widely used across Europe, and DJ EmailPublish is a plugin for email publishing and newsletter management, websites relying on this plugin for communication or marketing are at risk. The reflected XSS can be exploited to target site visitors or administrators, potentially leading to broader compromise or phishing attacks within the affected domain.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites using the DJ EmailPublish plugin for WordPress. Exploitation can lead to theft of user credentials, session tokens, or delivery of malicious payloads to site visitors, undermining user trust and potentially leading to data breaches. Organizations in sectors relying heavily on customer engagement via newsletters or email campaigns—such as retail, media, and public services—may experience reputational damage and regulatory scrutiny under GDPR if personal data is compromised. The reflected XSS does not directly impact server availability or integrity but can serve as a stepping stone for further attacks, including social engineering or lateral movement within an organization's web infrastructure. Since exploitation requires user interaction (clicking a malicious link), phishing campaigns leveraging this vulnerability could be effective. The scope change in CVSS suggests that successful exploitation can affect resources beyond the vulnerable component, increasing the potential impact. Given the medium severity, organizations should prioritize patching or mitigation to prevent exploitation, especially those with high web traffic or sensitive user data.

Mitigation Recommendations

1. Immediate upgrade or patching: Although no official patch links are provided, organizations should check for updates from the DJ EmailPublish plugin vendor or consider upgrading to a version beyond 1.7.2 if available. 2. Input sanitization: Implement web application firewall (WAF) rules to detect and block suspicious requests containing script payloads targeting the PHP_SELF parameter. 3. Content Security Policy (CSP): Deploy strict CSP headers to restrict execution of inline scripts and reduce the impact of XSS attacks. 4. URL validation: Modify the plugin code or use WordPress hooks to sanitize or validate the PHP_SELF variable before outputting it to the page. 5. User awareness: Educate users and administrators about the risks of clicking untrusted links, especially those that may appear in emails or third-party communications. 6. Monitoring and logging: Enable detailed logging of web requests to detect anomalous patterns indicative of attempted exploitation. 7. Segmentation: Limit administrative access to the WordPress backend and restrict plugin management permissions to trusted personnel only. 8. Backup and recovery: Maintain regular backups of website data and configurations to enable rapid restoration if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb941

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:00:53 AM

Last updated: 8/8/2025, 2:30:22 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats