Vulnerability Description
The WooCommerce Payment Gateway Per Category WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/includes/plugin_settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.10.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dreamfoxmedia | Woocommerce Payment Gateway Per Category | <= 2.0.10 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wc-payment-gateway-per-category/tags/ExploitThird Party Advisory
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38341Third Party Advisory
- https://plugins.trac.wordpress.org/browser/wc-payment-gateway-per-category/tags/ExploitThird Party Advisory
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38341Third Party Advisory
FAQ
What is CVE-2021-38341?
CVE-2021-38341 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The WooCommerce Payment Gateway Per Category WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/includes/plugin_settings.php file w...
How severe is CVE-2021-38341?
CVE-2021-38341 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-38341?
Check the references section above for vendor advisories and patch information. Affected products include: Dreamfoxmedia Woocommerce Payment Gateway Per Category.