### [CVE-2021-39322](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39322) ![](https://img.shields.io/static/v1?label=Product&message=Easy%20Social%20Icons&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.0.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen) ### Description The Easy Social Icons plugin <= 3.0.8 for WordPress echoes out the raw value of `$_SERVER['PHP_SELF']` in its main file. On certain configurations including Apache+modPHP this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path. ### POC #### Reference - https://wpvulndb.com/vulnerabilities/5e0bf0b6-9809-426b-b1d4-1fb653083b58 #### Github - https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates