CVE-2021-34652: CWE-79 Cross-site Scripting (XSS) in Media Usage Media Usage
The Media Usage WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter in the ~/mmu_admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.4.
AI Analysis
Technical Summary
CVE-2021-34652 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Media Usage WordPress plugin, specifically affecting versions up to and including 0.0.4. The vulnerability arises from improper sanitization of the 'id' parameter in the ~/mmu_admin.php file, which allows an attacker to inject arbitrary JavaScript code into the web page. When a victim user accesses a crafted URL containing malicious script code in the 'id' parameter, the injected script executes in the context of the victim's browser. This can lead to theft of session cookies, redirection to malicious sites, or execution of actions on behalf of the user. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity but not availability (C:L/I:L/A:N). No known exploits in the wild have been reported, and no official patches or updates have been linked in the provided data. The vulnerability affects the Media Usage plugin, which is a WordPress plugin used to manage media usage statistics or related functionality within WordPress sites. Exploitation requires tricking a user into clicking a malicious link or visiting a crafted page, as reflected XSS requires user interaction. The scope change indicates that the vulnerability can affect resources beyond the vulnerable component, potentially impacting the entire WordPress site or user session.
Potential Impact
For European organizations using WordPress sites with the vulnerable Media Usage plugin version 0.0.4 or earlier, this vulnerability poses a risk of session hijacking, unauthorized actions, and data leakage through the execution of malicious scripts in users' browsers. This can lead to compromised user accounts, defacement, or further exploitation of the site. Although the severity is medium and exploitation requires user interaction, the widespread use of WordPress in Europe, including by SMEs, public sector entities, and e-commerce platforms, increases the potential impact. Attackers could target employees or customers via phishing campaigns embedding malicious URLs exploiting this vulnerability. The confidentiality and integrity of user data and site content could be compromised, undermining trust and potentially leading to regulatory issues under GDPR if personal data is exposed or manipulated. The lack of a patch means organizations must rely on other mitigations until an update is available.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Media Usage plugin and verify its version. If version 0.0.4 or earlier is detected, the plugin should be disabled or removed until a patched version is released. In the absence of an official patch, organizations can implement Web Application Firewall (WAF) rules to detect and block suspicious requests containing script tags or suspicious payloads in the 'id' parameter targeting ~/mmu_admin.php. Additionally, applying Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of inline scripts and untrusted sources. User education to recognize phishing attempts and avoid clicking suspicious links is also critical. Monitoring web server logs for unusual query parameters or repeated attempts to exploit this vulnerability can help detect potential attacks. Finally, organizations should keep their WordPress core and all plugins updated regularly and subscribe to vulnerability advisories for timely patching.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2021-34652: CWE-79 Cross-site Scripting (XSS) in Media Usage Media Usage
Description
The Media Usage WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter in the ~/mmu_admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.4.
AI-Powered Analysis
Technical Analysis
CVE-2021-34652 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Media Usage WordPress plugin, specifically affecting versions up to and including 0.0.4. The vulnerability arises from improper sanitization of the 'id' parameter in the ~/mmu_admin.php file, which allows an attacker to inject arbitrary JavaScript code into the web page. When a victim user accesses a crafted URL containing malicious script code in the 'id' parameter, the injected script executes in the context of the victim's browser. This can lead to theft of session cookies, redirection to malicious sites, or execution of actions on behalf of the user. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity but not availability (C:L/I:L/A:N). No known exploits in the wild have been reported, and no official patches or updates have been linked in the provided data. The vulnerability affects the Media Usage plugin, which is a WordPress plugin used to manage media usage statistics or related functionality within WordPress sites. Exploitation requires tricking a user into clicking a malicious link or visiting a crafted page, as reflected XSS requires user interaction. The scope change indicates that the vulnerability can affect resources beyond the vulnerable component, potentially impacting the entire WordPress site or user session.
Potential Impact
For European organizations using WordPress sites with the vulnerable Media Usage plugin version 0.0.4 or earlier, this vulnerability poses a risk of session hijacking, unauthorized actions, and data leakage through the execution of malicious scripts in users' browsers. This can lead to compromised user accounts, defacement, or further exploitation of the site. Although the severity is medium and exploitation requires user interaction, the widespread use of WordPress in Europe, including by SMEs, public sector entities, and e-commerce platforms, increases the potential impact. Attackers could target employees or customers via phishing campaigns embedding malicious URLs exploiting this vulnerability. The confidentiality and integrity of user data and site content could be compromised, undermining trust and potentially leading to regulatory issues under GDPR if personal data is exposed or manipulated. The lack of a patch means organizations must rely on other mitigations until an update is available.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Media Usage plugin and verify its version. If version 0.0.4 or earlier is detected, the plugin should be disabled or removed until a patched version is released. In the absence of an official patch, organizations can implement Web Application Firewall (WAF) rules to detect and block suspicious requests containing script tags or suspicious payloads in the 'id' parameter targeting ~/mmu_admin.php. Additionally, applying Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of inline scripts and untrusted sources. User education to recognize phishing attempts and avoid clicking suspicious links is also critical. Monitoring web server logs for unusual query parameters or repeated attempts to exploit this vulnerability can help detect potential attacks. Finally, organizations should keep their WordPress core and all plugins updated regularly and subscribe to vulnerability advisories for timely patching.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdaeb4
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/6/2025, 8:26:25 PM
Last updated: 7/25/2025, 10:17:09 PM
Views: 11
Related Threats
CVE-2025-7679: CWE-306 Missing Authentication for Critical Function in ABB Aspect
HighCVE-2025-7677: CWE-306 Missing Authentication for Critical Function in ABB Aspect
MediumCVE-2025-53191: CWE-306 Missing Authentication for Critical Function in ABB Aspect
HighCVE-2025-53190: CWE-286 in ABB Aspect
HighCVE-2025-53189: CWE-639 Authorization Bypass Through User-Controlled Key in ABB Aspect
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.