Vulnerability Details CVE-2021-38325
The User Activation Email WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the uae-key parameter found in the ~/user-activation-email.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 43.7%
CVSS Severity
CVSS v3 Score 6.1
CVSS v2 Score 4.3
Products affected by CVE-2021-38325
-
cpe:2.3:a:user-activation-email_project:user-activation-email:-
-
cpe:2.3:a:user-activation-email_project:user-activation-email:0.1
-
cpe:2.3:a:user-activation-email_project:user-activation-email:0.2
-
cpe:2.3:a:user-activation-email_project:user-activation-email:0.3
-
cpe:2.3:a:user-activation-email_project:user-activation-email:0.4
-
cpe:2.3:a:user-activation-email_project:user-activation-email:1.0
-
cpe:2.3:a:user-activation-email_project:user-activation-email:1.2
-
cpe:2.3:a:user-activation-email_project:user-activation-email:1.2.1
-
cpe:2.3:a:user-activation-email_project:user-activation-email:1.2.2
-
cpe:2.3:a:user-activation-email_project:user-activation-email:1.3.0