Skip to main content

CVE-2021-38330: CWE-79 Cross-site Scripting (XSS) in Yet Another bol.com Plugin Yet Another bol.com Plugin

Medium
VulnerabilityCVE-2021-38330cvecve-2021-38330cwe-79
Published: Fri Sep 10 2021 (09/10/2021, 13:32:21 UTC)
Source: CVE
Vendor/Project: Yet Another bol.com Plugin
Product: Yet Another bol.com Plugin

Description

The Yet Another bol.com Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/yabp.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.

AI-Powered Analysis

AILast updated: 06/26/2025, 03:42:39 UTC

Technical Analysis

CVE-2021-38330 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Yet Another bol.com Plugin for WordPress, specifically affecting version 1.4 and earlier. The vulnerability arises from improper handling of the $_SERVER["PHP_SELF"] variable within the ~/yabp.php file. This variable, which contains the current script's filename, is reflected back to the user without adequate sanitization or encoding. An attacker can craft a malicious URL that injects arbitrary JavaScript code into this parameter, which is then executed in the context of the victim's browser when they access the vulnerable page. This reflected XSS flaw allows attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites. The vulnerability does not require authentication but does require user interaction, as the victim must click on or visit a crafted URL. The CVSS v3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges required, user interaction required, and a scope change due to the potential impact on other components. The impact affects confidentiality and integrity but not availability. There are no known exploits in the wild, and no official patches have been linked, suggesting that users should apply manual mitigations or updates if available. The plugin is designed to integrate bol.com marketplace features into WordPress sites, primarily targeting e-commerce or affiliate marketing websites that rely on bol.com product listings and sales integration.

Potential Impact

For European organizations, particularly those operating e-commerce or affiliate marketing websites using WordPress with the Yet Another bol.com Plugin, this vulnerability poses a risk of client-side attacks that can compromise user trust and data confidentiality. Exploitation could lead to theft of session cookies, enabling attackers to impersonate users or administrators, potentially leading to unauthorized actions within the website. Additionally, attackers could inject malicious scripts to perform phishing attacks or redirect users to fraudulent sites, damaging brand reputation and customer trust. While the vulnerability does not directly affect server availability or integrity, the indirect consequences of compromised user sessions and data leakage can have significant operational and legal repercussions, especially under GDPR regulations. Organizations relying on this plugin without timely updates or mitigations may face increased risk of targeted attacks, particularly in markets where bol.com integration is prevalent.

Mitigation Recommendations

1. Immediate removal or deactivation of the Yet Another bol.com Plugin version 1.4 or earlier until a patched version is available. 2. If plugin functionality is critical, implement a Web Application Firewall (WAF) with custom rules to detect and block suspicious input patterns targeting the PHP_SELF parameter, such as script tags or encoded payloads. 3. Sanitize and encode all user-controllable inputs reflected in web pages, especially $_SERVER variables, to prevent script injection. 4. Educate site administrators and users to avoid clicking on suspicious or unsolicited links that could exploit this vulnerability. 5. Monitor web server logs for unusual requests containing script payloads in URLs referencing yabp.php. 6. Consider isolating or sandboxing the plugin's output to limit the impact of any injected scripts. 7. Regularly audit and update all WordPress plugins to their latest versions and subscribe to security advisories related to bol.com integrations. 8. Implement Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on affected pages.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb9b3

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 3:42:39 AM

Last updated: 8/9/2025, 9:49:15 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats