CVE-2021-23150: CWE-79 Cross-site Scripting (XSS) in Ahmed Kaludi, Mohammed Kaludi AMP for WP – Accelerated Mobile Pages (WordPress plugin)
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability discovered in AMP for WP – Accelerated Mobile Pages plugin <= 1.0.77.31 versions.
AI Analysis
Technical Summary
CVE-2021-23150 is an authenticated stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'AMP for WP – Accelerated Mobile Pages' developed by Ahmed Kaludi and Mohammed Kaludi. This vulnerability exists in versions up to and including 1.0.77.31. The flaw is categorized under CWE-79, which involves improper neutralization of input leading to the injection of malicious scripts. Specifically, an attacker with administrative privileges (authenticated admin or higher) can inject malicious JavaScript code that is stored persistently within the plugin's data. When other users or administrators access the affected pages, the malicious script executes in their browsers, potentially leading to session hijacking, privilege escalation, or redirection to malicious sites. Since the vulnerability requires authenticated access with admin-level permissions, exploitation is limited to users who already have significant control over the WordPress environment. No public exploits have been reported in the wild, and no official patches or updates are linked in the provided data, though the vulnerability was publicly disclosed on March 18, 2022. The plugin is widely used to optimize WordPress sites for mobile performance by implementing AMP standards, making it a common component in many European websites relying on WordPress for content delivery and SEO optimization.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying heavily on WordPress for their web presence and using the AMP for WP plugin. An attacker with admin access could inject malicious scripts that compromise the confidentiality and integrity of user sessions, potentially leading to unauthorized access to sensitive data or administrative functions. This could result in defacement, data theft, or the spread of malware to site visitors, damaging organizational reputation and customer trust. The availability impact is limited but could occur if injected scripts disrupt site functionality or trigger security mechanisms that take the site offline. Given the requirement for admin-level authentication, the primary risk vector is insider threats or compromised admin credentials. European organizations in sectors such as e-commerce, media, and government that rely on WordPress and AMP for WP could face targeted attacks aiming to exploit this vulnerability to gain further footholds or conduct phishing campaigns leveraging trusted domains.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify the version of the AMP for WP plugin in use and upgrade to a patched version if available. If no official patch exists, administrators should consider disabling or removing the plugin until a fix is released. Implement strict access controls and multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Regularly audit admin user activity and permissions to detect any unauthorized changes or suspicious behavior. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious script injections targeting the plugin’s input fields. Additionally, sanitize and validate all user inputs within the WordPress environment, especially those that can be stored and rendered by the plugin. Monitoring logs for unusual admin actions and scanning the website for injected scripts can help in early detection of exploitation attempts. Finally, educate administrators about the risks of XSS and the importance of secure credential management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-23150: CWE-79 Cross-site Scripting (XSS) in Ahmed Kaludi, Mohammed Kaludi AMP for WP – Accelerated Mobile Pages (WordPress plugin)
Description
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability discovered in AMP for WP – Accelerated Mobile Pages plugin <= 1.0.77.31 versions.
AI-Powered Analysis
Technical Analysis
CVE-2021-23150 is an authenticated stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'AMP for WP – Accelerated Mobile Pages' developed by Ahmed Kaludi and Mohammed Kaludi. This vulnerability exists in versions up to and including 1.0.77.31. The flaw is categorized under CWE-79, which involves improper neutralization of input leading to the injection of malicious scripts. Specifically, an attacker with administrative privileges (authenticated admin or higher) can inject malicious JavaScript code that is stored persistently within the plugin's data. When other users or administrators access the affected pages, the malicious script executes in their browsers, potentially leading to session hijacking, privilege escalation, or redirection to malicious sites. Since the vulnerability requires authenticated access with admin-level permissions, exploitation is limited to users who already have significant control over the WordPress environment. No public exploits have been reported in the wild, and no official patches or updates are linked in the provided data, though the vulnerability was publicly disclosed on March 18, 2022. The plugin is widely used to optimize WordPress sites for mobile performance by implementing AMP standards, making it a common component in many European websites relying on WordPress for content delivery and SEO optimization.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying heavily on WordPress for their web presence and using the AMP for WP plugin. An attacker with admin access could inject malicious scripts that compromise the confidentiality and integrity of user sessions, potentially leading to unauthorized access to sensitive data or administrative functions. This could result in defacement, data theft, or the spread of malware to site visitors, damaging organizational reputation and customer trust. The availability impact is limited but could occur if injected scripts disrupt site functionality or trigger security mechanisms that take the site offline. Given the requirement for admin-level authentication, the primary risk vector is insider threats or compromised admin credentials. European organizations in sectors such as e-commerce, media, and government that rely on WordPress and AMP for WP could face targeted attacks aiming to exploit this vulnerability to gain further footholds or conduct phishing campaigns leveraging trusted domains.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify the version of the AMP for WP plugin in use and upgrade to a patched version if available. If no official patch exists, administrators should consider disabling or removing the plugin until a fix is released. Implement strict access controls and multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Regularly audit admin user activity and permissions to detect any unauthorized changes or suspicious behavior. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious script injections targeting the plugin’s input fields. Additionally, sanitize and validate all user inputs within the WordPress environment, especially those that can be stored and rendered by the plugin. Monitoring logs for unusual admin actions and scanning the website for injected scripts can help in early detection of exploitation attempts. Finally, educate administrators about the risks of XSS and the importance of secure credential management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2022-01-13T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf2aba
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 12:21:02 PM
Last updated: 8/11/2025, 7:33:59 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.