CVE-2021-38329: CWE-79 Cross-site Scripting (XSS) in DJ EmailPublish DJ EmailPublish
The DJ EmailPublish WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/dj-email-publish.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.7.2.
AI Analysis
Technical Summary
CVE-2021-38329 is a Reflected Cross-Site Scripting (XSS) vulnerability affecting the DJ EmailPublish WordPress plugin, specifically versions up to and including 1.7.2. The vulnerability arises from improper sanitization of the $_SERVER["PHP_SELF"] variable in the ~/dj-email-publish.php file. This variable reflects the current script's filename and path, which can be manipulated by an attacker to inject arbitrary JavaScript code. When a victim visits a crafted URL containing malicious script payloads, the injected code executes in their browser context. This can lead to session hijacking, credential theft, or other malicious actions performed on behalf of the victim. The vulnerability is classified under CWE-79, indicating a classic XSS flaw. The CVSS v3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No known public exploits have been reported, but the vulnerability is publicly disclosed and can be weaponized by attackers targeting vulnerable WordPress sites using this plugin. Since WordPress is widely used across Europe, and DJ EmailPublish is a plugin for email publishing and newsletter management, websites relying on this plugin for communication or marketing are at risk. The reflected XSS can be exploited to target site visitors or administrators, potentially leading to broader compromise or phishing attacks within the affected domain.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the DJ EmailPublish plugin for WordPress. Exploitation can lead to theft of user credentials, session tokens, or delivery of malicious payloads to site visitors, undermining user trust and potentially leading to data breaches. Organizations in sectors relying heavily on customer engagement via newsletters or email campaigns—such as retail, media, and public services—may experience reputational damage and regulatory scrutiny under GDPR if personal data is compromised. The reflected XSS does not directly impact server availability or integrity but can serve as a stepping stone for further attacks, including social engineering or lateral movement within an organization's web infrastructure. Since exploitation requires user interaction (clicking a malicious link), phishing campaigns leveraging this vulnerability could be effective. The scope change in CVSS suggests that successful exploitation can affect resources beyond the vulnerable component, increasing the potential impact. Given the medium severity, organizations should prioritize patching or mitigation to prevent exploitation, especially those with high web traffic or sensitive user data.
Mitigation Recommendations
1. Immediate upgrade or patching: Although no official patch links are provided, organizations should check for updates from the DJ EmailPublish plugin vendor or consider upgrading to a version beyond 1.7.2 if available. 2. Input sanitization: Implement web application firewall (WAF) rules to detect and block suspicious requests containing script payloads targeting the PHP_SELF parameter. 3. Content Security Policy (CSP): Deploy strict CSP headers to restrict execution of inline scripts and reduce the impact of XSS attacks. 4. URL validation: Modify the plugin code or use WordPress hooks to sanitize or validate the PHP_SELF variable before outputting it to the page. 5. User awareness: Educate users and administrators about the risks of clicking untrusted links, especially those that may appear in emails or third-party communications. 6. Monitoring and logging: Enable detailed logging of web requests to detect anomalous patterns indicative of attempted exploitation. 7. Segmentation: Limit administrative access to the WordPress backend and restrict plugin management permissions to trusted personnel only. 8. Backup and recovery: Maintain regular backups of website data and configurations to enable rapid restoration if compromise occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2021-38329: CWE-79 Cross-site Scripting (XSS) in DJ EmailPublish DJ EmailPublish
Description
The DJ EmailPublish WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/dj-email-publish.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.7.2.
AI-Powered Analysis
Technical Analysis
CVE-2021-38329 is a Reflected Cross-Site Scripting (XSS) vulnerability affecting the DJ EmailPublish WordPress plugin, specifically versions up to and including 1.7.2. The vulnerability arises from improper sanitization of the $_SERVER["PHP_SELF"] variable in the ~/dj-email-publish.php file. This variable reflects the current script's filename and path, which can be manipulated by an attacker to inject arbitrary JavaScript code. When a victim visits a crafted URL containing malicious script payloads, the injected code executes in their browser context. This can lead to session hijacking, credential theft, or other malicious actions performed on behalf of the victim. The vulnerability is classified under CWE-79, indicating a classic XSS flaw. The CVSS v3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No known public exploits have been reported, but the vulnerability is publicly disclosed and can be weaponized by attackers targeting vulnerable WordPress sites using this plugin. Since WordPress is widely used across Europe, and DJ EmailPublish is a plugin for email publishing and newsletter management, websites relying on this plugin for communication or marketing are at risk. The reflected XSS can be exploited to target site visitors or administrators, potentially leading to broader compromise or phishing attacks within the affected domain.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the DJ EmailPublish plugin for WordPress. Exploitation can lead to theft of user credentials, session tokens, or delivery of malicious payloads to site visitors, undermining user trust and potentially leading to data breaches. Organizations in sectors relying heavily on customer engagement via newsletters or email campaigns—such as retail, media, and public services—may experience reputational damage and regulatory scrutiny under GDPR if personal data is compromised. The reflected XSS does not directly impact server availability or integrity but can serve as a stepping stone for further attacks, including social engineering or lateral movement within an organization's web infrastructure. Since exploitation requires user interaction (clicking a malicious link), phishing campaigns leveraging this vulnerability could be effective. The scope change in CVSS suggests that successful exploitation can affect resources beyond the vulnerable component, increasing the potential impact. Given the medium severity, organizations should prioritize patching or mitigation to prevent exploitation, especially those with high web traffic or sensitive user data.
Mitigation Recommendations
1. Immediate upgrade or patching: Although no official patch links are provided, organizations should check for updates from the DJ EmailPublish plugin vendor or consider upgrading to a version beyond 1.7.2 if available. 2. Input sanitization: Implement web application firewall (WAF) rules to detect and block suspicious requests containing script payloads targeting the PHP_SELF parameter. 3. Content Security Policy (CSP): Deploy strict CSP headers to restrict execution of inline scripts and reduce the impact of XSS attacks. 4. URL validation: Modify the plugin code or use WordPress hooks to sanitize or validate the PHP_SELF variable before outputting it to the page. 5. User awareness: Educate users and administrators about the risks of clicking untrusted links, especially those that may appear in emails or third-party communications. 6. Monitoring and logging: Enable detailed logging of web requests to detect anomalous patterns indicative of attempted exploitation. 7. Segmentation: Limit administrative access to the WordPress backend and restrict plugin management permissions to trusted personnel only. 8. Backup and recovery: Maintain regular backups of website data and configurations to enable rapid restoration if compromise occurs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-08-09T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbeb941
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 4:00:53 AM
Last updated: 8/8/2025, 2:30:22 AM
Views: 15
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.