CVE-2021-34655: CWE-79 Cross-site Scripting (XSS) in WP Songbook WP Songbook
The WP Songbook WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the url parameter found in the ~/inc/class.ajax.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.11.
AI Analysis
Technical Summary
CVE-2021-34655 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WP Songbook WordPress plugin, specifically affecting versions up to and including 2.0.11. The vulnerability arises from improper sanitization of the 'url' parameter in the ~/inc/class.ajax.php file. An attacker can craft a malicious URL containing arbitrary JavaScript code injected into this parameter. When a victim clicks on this crafted link, the injected script executes in the context of the victim's browser session with the affected WordPress site. This reflected XSS attack does not require prior authentication but does require user interaction (clicking the malicious link). The vulnerability impacts confidentiality and integrity by potentially allowing attackers to steal session cookies, perform actions on behalf of the user, or manipulate displayed content. The CVSS 3.1 base score is 6.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and partial impact on confidentiality and integrity but no impact on availability. No known exploits in the wild have been reported, and no official patches or updates are linked in the provided information. The vulnerability is categorized under CWE-79, which covers improper neutralization of input leading to XSS. The reflected nature of the XSS means the malicious payload is not stored on the server but delivered via crafted URLs, making phishing or social engineering a likely attack vector.
Potential Impact
For European organizations using WordPress sites with the WP Songbook plugin version 2.0.11 or earlier, this vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed under the victim's identity. This can lead to compromised user accounts, defacement, or unauthorized data access. Organizations in sectors with high web presence such as media, entertainment, education, and cultural institutions that use WP Songbook to manage song libraries or music content are particularly at risk. The impact is exacerbated if the affected sites have privileged users or administrators who might be targeted. Although the vulnerability does not affect availability, the loss of confidentiality and integrity can undermine trust, cause reputational damage, and potentially lead to regulatory scrutiny under GDPR if personal data is compromised. The requirement for user interaction means phishing campaigns could be used to exploit this vulnerability, increasing the risk to end users and customers of affected organizations.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence and version of the WP Songbook plugin. If version 2.0.11 or earlier is detected, they should upgrade to the latest version where the vulnerability is patched. In the absence of an official patch, organizations should implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'url' parameter in the affected AJAX endpoint. Input validation and output encoding should be enforced at the application level to neutralize script injection attempts. Security teams should educate users about the risks of clicking suspicious links and implement multi-factor authentication to reduce the impact of stolen credentials. Regular security scanning and penetration testing focused on XSS vulnerabilities should be conducted. Additionally, monitoring web server logs for unusual query parameters and user activity can help detect exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2021-34655: CWE-79 Cross-site Scripting (XSS) in WP Songbook WP Songbook
Description
The WP Songbook WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the url parameter found in the ~/inc/class.ajax.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.11.
AI-Powered Analysis
Technical Analysis
CVE-2021-34655 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WP Songbook WordPress plugin, specifically affecting versions up to and including 2.0.11. The vulnerability arises from improper sanitization of the 'url' parameter in the ~/inc/class.ajax.php file. An attacker can craft a malicious URL containing arbitrary JavaScript code injected into this parameter. When a victim clicks on this crafted link, the injected script executes in the context of the victim's browser session with the affected WordPress site. This reflected XSS attack does not require prior authentication but does require user interaction (clicking the malicious link). The vulnerability impacts confidentiality and integrity by potentially allowing attackers to steal session cookies, perform actions on behalf of the user, or manipulate displayed content. The CVSS 3.1 base score is 6.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and partial impact on confidentiality and integrity but no impact on availability. No known exploits in the wild have been reported, and no official patches or updates are linked in the provided information. The vulnerability is categorized under CWE-79, which covers improper neutralization of input leading to XSS. The reflected nature of the XSS means the malicious payload is not stored on the server but delivered via crafted URLs, making phishing or social engineering a likely attack vector.
Potential Impact
For European organizations using WordPress sites with the WP Songbook plugin version 2.0.11 or earlier, this vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed under the victim's identity. This can lead to compromised user accounts, defacement, or unauthorized data access. Organizations in sectors with high web presence such as media, entertainment, education, and cultural institutions that use WP Songbook to manage song libraries or music content are particularly at risk. The impact is exacerbated if the affected sites have privileged users or administrators who might be targeted. Although the vulnerability does not affect availability, the loss of confidentiality and integrity can undermine trust, cause reputational damage, and potentially lead to regulatory scrutiny under GDPR if personal data is compromised. The requirement for user interaction means phishing campaigns could be used to exploit this vulnerability, increasing the risk to end users and customers of affected organizations.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence and version of the WP Songbook plugin. If version 2.0.11 or earlier is detected, they should upgrade to the latest version where the vulnerability is patched. In the absence of an official patch, organizations should implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'url' parameter in the affected AJAX endpoint. Input validation and output encoding should be enforced at the application level to neutralize script injection attempts. Security teams should educate users about the risks of clicking suspicious links and implement multi-factor authentication to reduce the impact of stolen credentials. Regular security scanning and penetration testing focused on XSS vulnerabilities should be conducted. Additionally, monitoring web server logs for unusual query parameters and user activity can help detect exploitation attempts early.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6830d8f30acd01a2492755f3
Added to database: 5/23/2025, 8:22:11 PM
Last enriched: 7/8/2025, 8:58:38 PM
Last updated: 2/7/2026, 2:27:19 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.