Skip to main content

CVE-2021-24433: CWE-79 Cross-Site Scripting (XSS) in Unknown simple sort&search

Medium
VulnerabilityCVE-2021-24433cvecve-2021-24433cwe-79
Published: Tue Jan 16 2024 (01/16/2024, 15:49:30 UTC)
Source: CVE Database V5
Vendor/Project: Unknown
Product: simple sort&search

Description

The simple sort&search WordPress plugin through 0.0.3 does not make sure that the indexurl parameter of the shortcodes "category_sims", "order_sims", "orderby_sims", "period_sims", and "tag_sims" use allowed URL protocols, which can lead to stored cross-site scripting by users with a role as low as Contributor

AI-Powered Analysis

AILast updated: 07/03/2025, 16:40:20 UTC

Technical Analysis

CVE-2021-24433 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'simple sort&search' up to version 0.0.3. The vulnerability arises because the plugin fails to properly validate the 'indexurl' parameter used in several shortcodes, including 'category_sims', 'order_sims', 'orderby_sims', 'period_sims', and 'tag_sims'. Specifically, it does not restrict the URL protocols allowed in this parameter, enabling an attacker with at least Contributor-level privileges to inject malicious scripts that are stored and executed in the context of users who view the affected pages. This stored XSS can lead to unauthorized actions performed on behalf of users, session hijacking, or redirection to malicious sites. The vulnerability requires low privileges (Contributor role), user interaction (viewing the injected content), and network access to the vulnerable WordPress site. The CVSS 3.1 base score is 5.4, reflecting a medium severity with partial impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild, and no official patches are linked, indicating that mitigation may require manual intervention or plugin updates if released.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites using the 'simple sort&search' WordPress plugin, especially those that allow contributors to add or edit content. Exploitation could lead to theft of user credentials or session tokens, unauthorized actions performed under legitimate user sessions, and potential defacement or redirection attacks. This can damage organizational reputation, lead to data breaches involving user information, and cause compliance issues under GDPR if personal data is compromised. Since WordPress is widely used across Europe for corporate, governmental, and small business websites, any vulnerable installations could be targeted for defacement or as entry points for broader attacks. However, the requirement for contributor-level access limits the attack surface somewhat, as attackers must first gain or have such access. The lack of known exploits reduces immediate risk but does not eliminate it, especially if attackers develop new exploit techniques.

Mitigation Recommendations

European organizations should first identify if they use the 'simple sort&search' plugin in their WordPress environments. If so, they should restrict contributor-level access strictly and audit existing contributor accounts for suspicious activity. Since no official patch is currently linked, organizations should consider temporarily disabling the plugin or removing the vulnerable shortcodes until a secure update is available. Implementing Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the 'indexurl' parameter can provide additional protection. Educating content contributors about safe input practices and monitoring logs for unusual shortcode usage can help detect exploitation attempts. Regularly updating WordPress core and plugins, and subscribing to vulnerability advisories for this plugin, will ensure timely application of future patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2021-01-14T15:03:46.692Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dc31f182aa0cae24a04d1

Added to database: 6/2/2025, 3:28:31 PM

Last enriched: 7/3/2025, 4:40:20 PM

Last updated: 7/28/2025, 5:10:55 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats