The Parsian Bank Gateway for Woocommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via and parameter due to a var_dump() on $_POST variables found in the ~/vendor/dpsoft/parsian-payment/sample/rollback-payment.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-25670 | The Parsian Bank Gateway for Woocommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via and parameter due to a var_dump() on $_POST variables found in the ~/vendor/dpsoft/parsian-payment/sample/rollback-payment.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0. |
Fixes
Solution
Uninstall plugin from WordPress site.
Workaround
No workaround given by the vendor.
References
History
Fri, 14 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-14T17:50:19.331Z
Reserved: 2021-08-20T00:00:00.000Z
Link: CVE-2021-39309
Updated: 2024-08-04T02:06:41.647Z
Status : Modified
Published: 2021-12-14T16:15:08.423
Modified: 2024-11-21T06:19:12.023
Link: CVE-2021-39309
No data.
OpenCVE Enrichment
No data.
EUVD