Description
The Parsian Bank Gateway for Woocommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via and parameter due to a var_dump() on $_POST variables found in the ~/vendor/dpsoft/parsian-payment/sample/rollback-payment.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.
No analysis available yet.
Remediation
Vendor Solution
Uninstall plugin from WordPress site.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-25670 | The Parsian Bank Gateway for Woocommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via and parameter due to a var_dump() on $_POST variables found in the ~/vendor/dpsoft/parsian-payment/sample/rollback-payment.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0. |
References
History
Fri, 14 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-14T17:50:19.331Z
Reserved: 2021-08-20T00:00:00.000Z
Link: CVE-2021-39309
Updated: 2024-08-04T02:06:41.647Z
Status : Modified
Published: 2021-12-14T16:15:08.423
Modified: 2024-11-21T06:19:12.023
Link: CVE-2021-39309
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD