Skip to main content

CVE-2021-38334: CWE-79 Cross-site Scripting (XSS) in WP Design Maps & Places WP Design Maps & Places

Medium
VulnerabilityCVE-2021-38334cvecve-2021-38334cwe-79
Published: Fri Sep 10 2021 (09/10/2021, 13:32:16 UTC)
Source: CVE
Vendor/Project: WP Design Maps & Places
Product: WP Design Maps & Places

Description

The WP Design Maps & Places WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the filename parameter found in the ~/wpdmp-admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.

AI-Powered Analysis

AILast updated: 06/26/2025, 03:42:13 UTC

Technical Analysis

CVE-2021-38334 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WP Design Maps & Places WordPress plugin, specifically affecting version 1.2 and earlier. The vulnerability arises from improper sanitization of the 'filename' parameter in the ~/wpdmp-admin.php file. An attacker can craft a malicious URL containing a specially crafted 'filename' parameter that injects arbitrary JavaScript code. When an administrator or user with access to the plugin's admin interface clicks on or visits this URL, the injected script executes in their browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The vulnerability is classified under CWE-79, indicating a failure to properly neutralize input that is later included in web pages without adequate validation or escaping. The CVSS v3.1 base score is 6.1 (medium severity), reflecting that the attack vector is network-based (remote), requires no privileges, but does require user interaction (clicking a malicious link). The impact affects confidentiality and integrity but not availability. No known exploits in the wild have been reported, and no official patches or updates are linked in the provided data, suggesting that mitigation may require manual intervention or plugin updates from the vendor. The vulnerability affects only version 1.2 and earlier, so upgrading to a fixed version (if available) is critical. The reflected nature of the XSS means it is primarily a targeted attack vector, relying on social engineering to lure users into clicking malicious links. However, successful exploitation can compromise administrative accounts, leading to broader site compromise or data leakage.

Potential Impact

For European organizations using WordPress sites with the WP Design Maps & Places plugin version 1.2 or earlier, this vulnerability poses a moderate risk. Exploitation could allow attackers to execute arbitrary scripts in the context of site administrators, potentially leading to theft of authentication cookies, unauthorized changes to site content or configurations, and exposure of sensitive data. This is particularly concerning for organizations that rely on WordPress for public-facing websites, intranets, or portals that handle personal or business-critical information. The reflected XSS could be used as a stepping stone for phishing campaigns targeting site administrators or users, increasing the risk of credential compromise. Although the vulnerability does not directly impact availability, the integrity and confidentiality of the affected sites could be compromised, leading to reputational damage, regulatory non-compliance (e.g., GDPR), and operational disruptions. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed. Organizations with limited patch management processes or those using outdated plugin versions are at higher risk.

Mitigation Recommendations

1. Immediate upgrade: Verify if the plugin vendor has released a patched version beyond 1.2. If so, promptly update to the latest secure version. 2. Input validation and sanitization: If upgrading is not immediately possible, implement web application firewall (WAF) rules to detect and block requests containing suspicious 'filename' parameter values that include script tags or encoded payloads. 3. User awareness: Educate administrators and users with plugin access to be cautious about clicking on unsolicited or suspicious links, especially those targeting the admin interface. 4. Access restrictions: Limit access to the WordPress admin panel and the plugin’s admin pages by IP whitelisting or VPN access to reduce exposure to external attackers. 5. Monitoring and logging: Enable detailed logging of HTTP requests to the admin interface and monitor for unusual or repeated access attempts with suspicious parameters. 6. Content Security Policy (CSP): Deploy a strict CSP header to reduce the impact of XSS by restricting the execution of inline scripts and loading of external scripts. 7. Regular vulnerability scanning: Incorporate automated scanning tools to detect outdated plugins and known vulnerabilities in WordPress environments. 8. Backup and recovery: Maintain regular backups of the WordPress site and database to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb9bb

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 3:42:13 AM

Last updated: 8/16/2025, 11:54:06 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats