Skip to main content

CVE-2021-38357: CWE-79 Cross-site Scripting (XSS) in SMS OVH SMS OVH

Medium
VulnerabilityCVE-2021-38357cvecve-2021-38357cwe-79
Published: Fri Sep 10 2021 (09/10/2021, 13:34:58 UTC)
Source: CVE
Vendor/Project: SMS OVH
Product: SMS OVH

Description

The SMS OVH WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the position parameter found in the ~/sms-ovh-sent.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.1.

AI-Powered Analysis

AILast updated: 06/26/2025, 03:27:02 UTC

Technical Analysis

CVE-2021-38357 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the SMS OVH WordPress plugin, specifically affecting version 0.1 and earlier. The vulnerability arises from improper sanitization of the 'position' parameter in the ~/sms-ovh-sent.php file, which allows an attacker to inject arbitrary JavaScript code into the web page. When a victim visits a crafted URL containing malicious script code in the 'position' parameter, the injected script executes in the context of the victim's browser. This can lead to theft of session cookies, redirection to malicious sites, or execution of unauthorized actions on behalf of the user. The vulnerability is classified as CWE-79, which is a common web application security flaw related to improper input validation and output encoding. The CVSS v3.1 base score is 6.1 (medium severity), with the vector indicating that the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but requires user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact is limited to low confidentiality and integrity impacts, with no availability impact. No known exploits in the wild have been reported, and no official patches are listed, suggesting that users of the plugin should consider upgrading or mitigating the risk through other means. Since the vulnerability is in a WordPress plugin, it affects websites using this plugin for SMS-related functionality, potentially exposing site visitors or administrators to XSS attacks.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites using the SMS OVH WordPress plugin version 0.1 or earlier. Exploitation could lead to session hijacking, unauthorized actions, or phishing attacks targeting users of affected websites. This can result in compromised user accounts, leakage of sensitive information, and reputational damage. Organizations relying on this plugin for customer communications or internal notifications may face disruptions or data integrity issues. Since the vulnerability requires user interaction, the impact is somewhat limited to targeted phishing or social engineering campaigns. However, given the widespread use of WordPress in Europe and the popularity of OVH as a hosting provider and SMS service, the attack surface is notable. Additionally, sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, could face compliance risks if user data is compromised. The reflected XSS could also be leveraged as a stepping stone for more complex attacks, including privilege escalation or malware delivery.

Mitigation Recommendations

1. Immediate mitigation involves disabling or removing the vulnerable SMS OVH plugin version 0.1 from WordPress installations until an official patch or updated version is available. 2. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'position' parameter in the sms-ovh-sent.php endpoint. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected web pages, limiting the impact of any successful injection. 4. Conduct regular security audits and input validation reviews on all WordPress plugins, especially those handling user input parameters. 5. Educate users and administrators about the risks of clicking on suspicious links that may exploit reflected XSS vulnerabilities. 6. Monitor web server logs for unusual query parameters or repeated access attempts to the vulnerable script. 7. If upgrading the plugin is not immediately possible, consider custom patching or sanitizing the 'position' parameter via server-side code to neutralize script injections. 8. Maintain up-to-date backups of affected websites to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeba3f

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 3:27:02 AM

Last updated: 8/15/2025, 5:51:36 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats