Skip to main content

CVE-2021-23150: CWE-79 Cross-site Scripting (XSS) in Ahmed Kaludi, Mohammed Kaludi AMP for WP – Accelerated Mobile Pages (WordPress plugin)

Medium
Published: Fri Mar 18 2022 (03/18/2022, 18:00:24 UTC)
Source: CVE
Vendor/Project: Ahmed Kaludi, Mohammed Kaludi
Product: AMP for WP – Accelerated Mobile Pages (WordPress plugin)

Description

Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability discovered in AMP for WP – Accelerated Mobile Pages plugin <= 1.0.77.31 versions.

AI-Powered Analysis

AILast updated: 06/23/2025, 12:21:02 UTC

Technical Analysis

CVE-2021-23150 is an authenticated stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'AMP for WP – Accelerated Mobile Pages' developed by Ahmed Kaludi and Mohammed Kaludi. This vulnerability exists in versions up to and including 1.0.77.31. The flaw is categorized under CWE-79, which involves improper neutralization of input leading to the injection of malicious scripts. Specifically, an attacker with administrative privileges (authenticated admin or higher) can inject malicious JavaScript code that is stored persistently within the plugin's data. When other users or administrators access the affected pages, the malicious script executes in their browsers, potentially leading to session hijacking, privilege escalation, or redirection to malicious sites. Since the vulnerability requires authenticated access with admin-level permissions, exploitation is limited to users who already have significant control over the WordPress environment. No public exploits have been reported in the wild, and no official patches or updates are linked in the provided data, though the vulnerability was publicly disclosed on March 18, 2022. The plugin is widely used to optimize WordPress sites for mobile performance by implementing AMP standards, making it a common component in many European websites relying on WordPress for content delivery and SEO optimization.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying heavily on WordPress for their web presence and using the AMP for WP plugin. An attacker with admin access could inject malicious scripts that compromise the confidentiality and integrity of user sessions, potentially leading to unauthorized access to sensitive data or administrative functions. This could result in defacement, data theft, or the spread of malware to site visitors, damaging organizational reputation and customer trust. The availability impact is limited but could occur if injected scripts disrupt site functionality or trigger security mechanisms that take the site offline. Given the requirement for admin-level authentication, the primary risk vector is insider threats or compromised admin credentials. European organizations in sectors such as e-commerce, media, and government that rely on WordPress and AMP for WP could face targeted attacks aiming to exploit this vulnerability to gain further footholds or conduct phishing campaigns leveraging trusted domains.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify the version of the AMP for WP plugin in use and upgrade to a patched version if available. If no official patch exists, administrators should consider disabling or removing the plugin until a fix is released. Implement strict access controls and multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Regularly audit admin user activity and permissions to detect any unauthorized changes or suspicious behavior. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious script injections targeting the plugin’s input fields. Additionally, sanitize and validate all user inputs within the WordPress environment, especially those that can be stored and rendered by the plugin. Monitoring logs for unusual admin actions and scanning the website for injected scripts can help in early detection of exploitation attempts. Finally, educate administrators about the risks of XSS and the importance of secure credential management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2022-01-13T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf2aba

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 12:21:02 PM

Last updated: 8/11/2025, 7:33:59 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats