Description
The User Activation Email WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the uae-key parameter found in the ~/user-activation-email.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.0.
No analysis available yet.
Remediation
Vendor Solution
Uninstall plugin from WordPress site.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-24778 | The User Activation Email WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the uae-key parameter found in the ~/user-activation-email.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.0. |
References
History
Mon, 05 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-05-05T14:48:59.394Z
Reserved: 2021-08-09T00:00:00.000Z
Link: CVE-2021-38325
Updated: 2024-08-04T01:37:16.329Z
Status : Modified
Published: 2021-09-09T19:15:14.150
Modified: 2024-11-21T06:16:48.703
Link: CVE-2021-38325
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD