CVE-2021-38330: CWE-79 Cross-site Scripting (XSS) in Yet Another bol.com Plugin Yet Another bol.com Plugin
The Yet Another bol.com Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/yabp.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.
AI Analysis
Technical Summary
CVE-2021-38330 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Yet Another bol.com Plugin for WordPress, specifically affecting version 1.4 and earlier. The vulnerability arises from improper handling of the $_SERVER["PHP_SELF"] variable within the ~/yabp.php file. This variable, which contains the current script's filename, is reflected back to the user without adequate sanitization or encoding. An attacker can craft a malicious URL that injects arbitrary JavaScript code into this parameter, which is then executed in the context of the victim's browser when they access the vulnerable page. This reflected XSS flaw allows attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites. The vulnerability does not require authentication but does require user interaction, as the victim must click on or visit a crafted URL. The CVSS v3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges required, user interaction required, and a scope change due to the potential impact on other components. The impact affects confidentiality and integrity but not availability. There are no known exploits in the wild, and no official patches have been linked, suggesting that users should apply manual mitigations or updates if available. The plugin is designed to integrate bol.com marketplace features into WordPress sites, primarily targeting e-commerce or affiliate marketing websites that rely on bol.com product listings and sales integration.
Potential Impact
For European organizations, particularly those operating e-commerce or affiliate marketing websites using WordPress with the Yet Another bol.com Plugin, this vulnerability poses a risk of client-side attacks that can compromise user trust and data confidentiality. Exploitation could lead to theft of session cookies, enabling attackers to impersonate users or administrators, potentially leading to unauthorized actions within the website. Additionally, attackers could inject malicious scripts to perform phishing attacks or redirect users to fraudulent sites, damaging brand reputation and customer trust. While the vulnerability does not directly affect server availability or integrity, the indirect consequences of compromised user sessions and data leakage can have significant operational and legal repercussions, especially under GDPR regulations. Organizations relying on this plugin without timely updates or mitigations may face increased risk of targeted attacks, particularly in markets where bol.com integration is prevalent.
Mitigation Recommendations
1. Immediate removal or deactivation of the Yet Another bol.com Plugin version 1.4 or earlier until a patched version is available. 2. If plugin functionality is critical, implement a Web Application Firewall (WAF) with custom rules to detect and block suspicious input patterns targeting the PHP_SELF parameter, such as script tags or encoded payloads. 3. Sanitize and encode all user-controllable inputs reflected in web pages, especially $_SERVER variables, to prevent script injection. 4. Educate site administrators and users to avoid clicking on suspicious or unsolicited links that could exploit this vulnerability. 5. Monitor web server logs for unusual requests containing script payloads in URLs referencing yabp.php. 6. Consider isolating or sandboxing the plugin's output to limit the impact of any injected scripts. 7. Regularly audit and update all WordPress plugins to their latest versions and subscribe to security advisories related to bol.com integrations. 8. Implement Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on affected pages.
Affected Countries
Netherlands, Belgium, Germany, France, United Kingdom
CVE-2021-38330: CWE-79 Cross-site Scripting (XSS) in Yet Another bol.com Plugin Yet Another bol.com Plugin
Description
The Yet Another bol.com Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/yabp.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.
AI-Powered Analysis
Technical Analysis
CVE-2021-38330 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Yet Another bol.com Plugin for WordPress, specifically affecting version 1.4 and earlier. The vulnerability arises from improper handling of the $_SERVER["PHP_SELF"] variable within the ~/yabp.php file. This variable, which contains the current script's filename, is reflected back to the user without adequate sanitization or encoding. An attacker can craft a malicious URL that injects arbitrary JavaScript code into this parameter, which is then executed in the context of the victim's browser when they access the vulnerable page. This reflected XSS flaw allows attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites. The vulnerability does not require authentication but does require user interaction, as the victim must click on or visit a crafted URL. The CVSS v3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges required, user interaction required, and a scope change due to the potential impact on other components. The impact affects confidentiality and integrity but not availability. There are no known exploits in the wild, and no official patches have been linked, suggesting that users should apply manual mitigations or updates if available. The plugin is designed to integrate bol.com marketplace features into WordPress sites, primarily targeting e-commerce or affiliate marketing websites that rely on bol.com product listings and sales integration.
Potential Impact
For European organizations, particularly those operating e-commerce or affiliate marketing websites using WordPress with the Yet Another bol.com Plugin, this vulnerability poses a risk of client-side attacks that can compromise user trust and data confidentiality. Exploitation could lead to theft of session cookies, enabling attackers to impersonate users or administrators, potentially leading to unauthorized actions within the website. Additionally, attackers could inject malicious scripts to perform phishing attacks or redirect users to fraudulent sites, damaging brand reputation and customer trust. While the vulnerability does not directly affect server availability or integrity, the indirect consequences of compromised user sessions and data leakage can have significant operational and legal repercussions, especially under GDPR regulations. Organizations relying on this plugin without timely updates or mitigations may face increased risk of targeted attacks, particularly in markets where bol.com integration is prevalent.
Mitigation Recommendations
1. Immediate removal or deactivation of the Yet Another bol.com Plugin version 1.4 or earlier until a patched version is available. 2. If plugin functionality is critical, implement a Web Application Firewall (WAF) with custom rules to detect and block suspicious input patterns targeting the PHP_SELF parameter, such as script tags or encoded payloads. 3. Sanitize and encode all user-controllable inputs reflected in web pages, especially $_SERVER variables, to prevent script injection. 4. Educate site administrators and users to avoid clicking on suspicious or unsolicited links that could exploit this vulnerability. 5. Monitor web server logs for unusual requests containing script payloads in URLs referencing yabp.php. 6. Consider isolating or sandboxing the plugin's output to limit the impact of any injected scripts. 7. Regularly audit and update all WordPress plugins to their latest versions and subscribe to security advisories related to bol.com integrations. 8. Implement Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on affected pages.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-08-09T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbeb9b3
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 3:42:39 AM
Last updated: 8/9/2025, 9:49:15 AM
Views: 10
Related Threats
CVE-2025-8853: CWE-290 Authentication Bypass by Spoofing in 2100 Technology Official Document Management System
CriticalCVE-2025-8838: Improper Authentication in WinterChenS my-site
MediumCVE-2025-8837: Use After Free in JasPer
MediumCVE-2025-8661: Vulnerability in Broadcom Symantec PGP Encryption
MediumCVE-2025-8836: Reachable Assertion in JasPer
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.