CVE-2021-38332: CWE-79 Cross-site Scripting (XSS) in On Page SEO + Whatsapp Chat Button On Page SEO + Whatsapp Chat Button
The On Page SEO + Whatsapp Chat Button Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.1.
AI Analysis
Technical Summary
CVE-2021-38332 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin 'On Page SEO + Whatsapp Chat Button' version 1.0.1 and earlier. The vulnerability arises due to improper sanitization of the $_SERVER["PHP_SELF"] variable in the settings.php file. Specifically, the plugin reflects the PHP_SELF server variable directly into the web page without adequate encoding or filtering, allowing an attacker to inject arbitrary JavaScript code. When a victim visits a crafted URL containing malicious script code embedded in the PHP_SELF value, the injected script executes in the victim's browser context. This can lead to theft of session cookies, redirection to malicious sites, or execution of other malicious actions within the user's browser session. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No known exploits in the wild have been reported to date. The vulnerability affects only version 1.0.1 and earlier of the plugin, which is used to add SEO and WhatsApp chat button functionality to WordPress sites. Since WordPress is widely used across many sectors, any site using this plugin version is potentially vulnerable to reflected XSS attacks, which can be leveraged for phishing, session hijacking, or delivering further client-side attacks. No official patch or update link is provided in the data, so users must verify plugin updates or consider disabling the plugin until a fix is available.
Potential Impact
For European organizations, the impact of this vulnerability can vary depending on the usage of the affected plugin. Organizations running WordPress sites with the 'On Page SEO + Whatsapp Chat Button' plugin version 1.0.1 or earlier are at risk of reflected XSS attacks. Such attacks can compromise user sessions, leading to unauthorized access to user accounts or leakage of sensitive information. This is particularly concerning for organizations handling personal data under GDPR, as exploitation could lead to data breaches and regulatory penalties. Additionally, attackers could use this vulnerability to conduct phishing campaigns by injecting malicious scripts that mimic legitimate site content, potentially damaging brand reputation and user trust. The reflected nature of the XSS means that the attack requires a victim to click a crafted link, so social engineering is a key component. However, the low attack complexity and no requirement for privileges make it accessible to a wide range of attackers. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the vulnerable component, potentially impacting other parts of the web application. While no availability impact is noted, the confidentiality and integrity impacts are significant enough to warrant attention. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure. European organizations with customer-facing WordPress sites using this plugin should be vigilant to prevent exploitation that could lead to data leakage, session hijacking, or reputational damage.
Mitigation Recommendations
1. Immediate action should be to verify the version of the 'On Page SEO + Whatsapp Chat Button' plugin installed on WordPress sites. If version 1.0.1 or earlier is in use, upgrade to a patched version if available. If no patch exists, consider disabling or uninstalling the plugin until a fix is released. 2. Implement Web Application Firewall (WAF) rules specifically targeting reflected XSS patterns, particularly those involving manipulation of the PHP_SELF variable or suspicious URL parameters. 3. Employ Content Security Policy (CSP) headers to restrict execution of inline scripts and reduce the impact of injected scripts. 4. Sanitize and encode all user-controllable inputs and reflected data on the server side to prevent injection of malicious scripts. While this is a developer-side fix, organizations with custom plugins or themes should audit code for similar issues. 5. Educate users and administrators about the risks of clicking on suspicious links, as user interaction is required for exploitation. 6. Monitor web server logs and security alerts for unusual URL requests containing suspicious payloads targeting PHP_SELF or other parameters. 7. Conduct regular vulnerability scanning and penetration testing focused on XSS vulnerabilities to detect similar issues proactively. 8. For organizations with high-value targets, consider deploying browser isolation or endpoint protection solutions that can mitigate client-side script execution risks. These steps go beyond generic advice by focusing on immediate plugin management, targeted WAF tuning, CSP deployment, and user awareness tailored to the specifics of this reflected XSS vulnerability.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2021-38332: CWE-79 Cross-site Scripting (XSS) in On Page SEO + Whatsapp Chat Button On Page SEO + Whatsapp Chat Button
Description
The On Page SEO + Whatsapp Chat Button Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.1.
AI-Powered Analysis
Technical Analysis
CVE-2021-38332 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin 'On Page SEO + Whatsapp Chat Button' version 1.0.1 and earlier. The vulnerability arises due to improper sanitization of the $_SERVER["PHP_SELF"] variable in the settings.php file. Specifically, the plugin reflects the PHP_SELF server variable directly into the web page without adequate encoding or filtering, allowing an attacker to inject arbitrary JavaScript code. When a victim visits a crafted URL containing malicious script code embedded in the PHP_SELF value, the injected script executes in the victim's browser context. This can lead to theft of session cookies, redirection to malicious sites, or execution of other malicious actions within the user's browser session. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No known exploits in the wild have been reported to date. The vulnerability affects only version 1.0.1 and earlier of the plugin, which is used to add SEO and WhatsApp chat button functionality to WordPress sites. Since WordPress is widely used across many sectors, any site using this plugin version is potentially vulnerable to reflected XSS attacks, which can be leveraged for phishing, session hijacking, or delivering further client-side attacks. No official patch or update link is provided in the data, so users must verify plugin updates or consider disabling the plugin until a fix is available.
Potential Impact
For European organizations, the impact of this vulnerability can vary depending on the usage of the affected plugin. Organizations running WordPress sites with the 'On Page SEO + Whatsapp Chat Button' plugin version 1.0.1 or earlier are at risk of reflected XSS attacks. Such attacks can compromise user sessions, leading to unauthorized access to user accounts or leakage of sensitive information. This is particularly concerning for organizations handling personal data under GDPR, as exploitation could lead to data breaches and regulatory penalties. Additionally, attackers could use this vulnerability to conduct phishing campaigns by injecting malicious scripts that mimic legitimate site content, potentially damaging brand reputation and user trust. The reflected nature of the XSS means that the attack requires a victim to click a crafted link, so social engineering is a key component. However, the low attack complexity and no requirement for privileges make it accessible to a wide range of attackers. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the vulnerable component, potentially impacting other parts of the web application. While no availability impact is noted, the confidentiality and integrity impacts are significant enough to warrant attention. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure. European organizations with customer-facing WordPress sites using this plugin should be vigilant to prevent exploitation that could lead to data leakage, session hijacking, or reputational damage.
Mitigation Recommendations
1. Immediate action should be to verify the version of the 'On Page SEO + Whatsapp Chat Button' plugin installed on WordPress sites. If version 1.0.1 or earlier is in use, upgrade to a patched version if available. If no patch exists, consider disabling or uninstalling the plugin until a fix is released. 2. Implement Web Application Firewall (WAF) rules specifically targeting reflected XSS patterns, particularly those involving manipulation of the PHP_SELF variable or suspicious URL parameters. 3. Employ Content Security Policy (CSP) headers to restrict execution of inline scripts and reduce the impact of injected scripts. 4. Sanitize and encode all user-controllable inputs and reflected data on the server side to prevent injection of malicious scripts. While this is a developer-side fix, organizations with custom plugins or themes should audit code for similar issues. 5. Educate users and administrators about the risks of clicking on suspicious links, as user interaction is required for exploitation. 6. Monitor web server logs and security alerts for unusual URL requests containing suspicious payloads targeting PHP_SELF or other parameters. 7. Conduct regular vulnerability scanning and penetration testing focused on XSS vulnerabilities to detect similar issues proactively. 8. For organizations with high-value targets, consider deploying browser isolation or endpoint protection solutions that can mitigate client-side script execution risks. These steps go beyond generic advice by focusing on immediate plugin management, targeted WAF tuning, CSP deployment, and user awareness tailored to the specifics of this reflected XSS vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-08-09T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbeb9b7
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 3:42:27 AM
Last updated: 8/13/2025, 8:41:57 AM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.