CVE-2021-34655: CWE-79 Cross-site Scripting (XSS) in WP Songbook WP Songbook
The WP Songbook WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the url parameter found in the ~/inc/class.ajax.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.11.
AI Analysis
Technical Summary
CVE-2021-34655 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WP Songbook WordPress plugin, specifically affecting versions up to and including 2.0.11. The vulnerability arises from improper sanitization of the 'url' parameter in the ~/inc/class.ajax.php file. An attacker can craft a malicious URL containing arbitrary JavaScript code injected into this parameter. When a victim clicks on this crafted link, the injected script executes in the context of the victim's browser session with the affected WordPress site. This reflected XSS attack does not require prior authentication but does require user interaction (clicking the malicious link). The vulnerability impacts confidentiality and integrity by potentially allowing attackers to steal session cookies, perform actions on behalf of the user, or manipulate displayed content. The CVSS 3.1 base score is 6.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and partial impact on confidentiality and integrity but no impact on availability. No known exploits in the wild have been reported, and no official patches or updates are linked in the provided information. The vulnerability is categorized under CWE-79, which covers improper neutralization of input leading to XSS. The reflected nature of the XSS means the malicious payload is not stored on the server but delivered via crafted URLs, making phishing or social engineering a likely attack vector.
Potential Impact
For European organizations using WordPress sites with the WP Songbook plugin version 2.0.11 or earlier, this vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed under the victim's identity. This can lead to compromised user accounts, defacement, or unauthorized data access. Organizations in sectors with high web presence such as media, entertainment, education, and cultural institutions that use WP Songbook to manage song libraries or music content are particularly at risk. The impact is exacerbated if the affected sites have privileged users or administrators who might be targeted. Although the vulnerability does not affect availability, the loss of confidentiality and integrity can undermine trust, cause reputational damage, and potentially lead to regulatory scrutiny under GDPR if personal data is compromised. The requirement for user interaction means phishing campaigns could be used to exploit this vulnerability, increasing the risk to end users and customers of affected organizations.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence and version of the WP Songbook plugin. If version 2.0.11 or earlier is detected, they should upgrade to the latest version where the vulnerability is patched. In the absence of an official patch, organizations should implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'url' parameter in the affected AJAX endpoint. Input validation and output encoding should be enforced at the application level to neutralize script injection attempts. Security teams should educate users about the risks of clicking suspicious links and implement multi-factor authentication to reduce the impact of stolen credentials. Regular security scanning and penetration testing focused on XSS vulnerabilities should be conducted. Additionally, monitoring web server logs for unusual query parameters and user activity can help detect exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2021-34655: CWE-79 Cross-site Scripting (XSS) in WP Songbook WP Songbook
Description
The WP Songbook WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the url parameter found in the ~/inc/class.ajax.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.11.
AI-Powered Analysis
Technical Analysis
CVE-2021-34655 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WP Songbook WordPress plugin, specifically affecting versions up to and including 2.0.11. The vulnerability arises from improper sanitization of the 'url' parameter in the ~/inc/class.ajax.php file. An attacker can craft a malicious URL containing arbitrary JavaScript code injected into this parameter. When a victim clicks on this crafted link, the injected script executes in the context of the victim's browser session with the affected WordPress site. This reflected XSS attack does not require prior authentication but does require user interaction (clicking the malicious link). The vulnerability impacts confidentiality and integrity by potentially allowing attackers to steal session cookies, perform actions on behalf of the user, or manipulate displayed content. The CVSS 3.1 base score is 6.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and partial impact on confidentiality and integrity but no impact on availability. No known exploits in the wild have been reported, and no official patches or updates are linked in the provided information. The vulnerability is categorized under CWE-79, which covers improper neutralization of input leading to XSS. The reflected nature of the XSS means the malicious payload is not stored on the server but delivered via crafted URLs, making phishing or social engineering a likely attack vector.
Potential Impact
For European organizations using WordPress sites with the WP Songbook plugin version 2.0.11 or earlier, this vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed under the victim's identity. This can lead to compromised user accounts, defacement, or unauthorized data access. Organizations in sectors with high web presence such as media, entertainment, education, and cultural institutions that use WP Songbook to manage song libraries or music content are particularly at risk. The impact is exacerbated if the affected sites have privileged users or administrators who might be targeted. Although the vulnerability does not affect availability, the loss of confidentiality and integrity can undermine trust, cause reputational damage, and potentially lead to regulatory scrutiny under GDPR if personal data is compromised. The requirement for user interaction means phishing campaigns could be used to exploit this vulnerability, increasing the risk to end users and customers of affected organizations.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence and version of the WP Songbook plugin. If version 2.0.11 or earlier is detected, they should upgrade to the latest version where the vulnerability is patched. In the absence of an official patch, organizations should implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'url' parameter in the affected AJAX endpoint. Input validation and output encoding should be enforced at the application level to neutralize script injection attempts. Security teams should educate users about the risks of clicking suspicious links and implement multi-factor authentication to reduce the impact of stolen credentials. Regular security scanning and penetration testing focused on XSS vulnerabilities should be conducted. Additionally, monitoring web server logs for unusual query parameters and user activity can help detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6830d8f30acd01a2492755f3
Added to database: 5/23/2025, 8:22:11 PM
Last enriched: 7/8/2025, 8:58:38 PM
Last updated: 7/26/2025, 1:19:49 PM
Views: 12
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.