CVE-2021-34656: CWE-79 Cross-site Scripting (XSS) in 2Way VideoCalls and Random Chat - HTML5 Webcam Videochat 2Way VideoCalls and Random Chat - HTML5 Webcam Videochat
The 2Way VideoCalls and Random Chat - HTML5 Webcam Videochat WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the `vws_notice` function found in the ~/inc/requirements.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 5.2.7.
AI Analysis
Technical Summary
CVE-2021-34656 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin '2Way VideoCalls and Random Chat - HTML5 Webcam Videochat', specifically in versions up to and including 5.2.7. The vulnerability arises from improper sanitization of user-supplied input in the `vws_notice` function located in the ~/inc/requirements.php file. This flaw allows an attacker to inject arbitrary JavaScript code that is reflected back to the user without adequate validation or encoding. When a victim visits a crafted URL or interacts with a maliciously crafted input, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or other malicious actions. The vulnerability is classified under CWE-79, which pertains to Cross-Site Scripting issues. According to the CVSS v3.1 scoring, this vulnerability has a score of 6.1 (medium severity) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. This indicates that the attack can be performed remotely over the network without privileges, requires low attack complexity, does not require authentication, but does require user interaction (clicking a malicious link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the security scope of the vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not affect availability. No known exploits in the wild have been reported, and no official patches are linked in the provided data, though it is recommended to check for updates or vendor advisories. The vulnerability is particularly relevant for websites using this specific WordPress plugin to provide video call and chat functionality, which may be targeted by attackers to compromise users or site administrators.
Potential Impact
For European organizations, the impact of this vulnerability can be significant depending on the usage of the affected plugin. Organizations running WordPress sites with the '2Way VideoCalls and Random Chat - HTML5 Webcam Videochat' plugin expose their users and administrators to potential session hijacking, theft of sensitive information, or unauthorized actions performed via injected scripts. This can lead to compromised user accounts, data leakage, and reputational damage. Since the vulnerability requires user interaction, phishing campaigns targeting employees or customers could exploit this flaw to gain unauthorized access or spread malware. Additionally, the scope change in the vulnerability indicates that the attacker could potentially escalate the impact beyond the immediate plugin context, possibly affecting other parts of the website or connected systems. For sectors such as finance, healthcare, or government within Europe, where data protection regulations like GDPR are stringent, exploitation of this vulnerability could result in regulatory penalties and loss of trust. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities after disclosure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should take the following specific actions: 1) Immediately identify and inventory WordPress sites using the affected plugin version (up to 5.2.7). 2) Update the plugin to the latest available version where the vulnerability is fixed; if no patch is available, consider disabling or removing the plugin until a fix is released. 3) Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the vulnerable parameter `vws_notice`. 4) Conduct user awareness training to reduce the risk of successful phishing attacks that could exploit this vulnerability. 5) Review and harden Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 6) Monitor web server and application logs for suspicious requests containing script injection attempts. 7) Employ security plugins that sanitize inputs and outputs to add an additional layer of defense. 8) Regularly audit and test web applications for XSS and other injection vulnerabilities to proactively identify security gaps. These steps go beyond generic advice by focusing on plugin-specific actions, detection, and user education tailored to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2021-34656: CWE-79 Cross-site Scripting (XSS) in 2Way VideoCalls and Random Chat - HTML5 Webcam Videochat 2Way VideoCalls and Random Chat - HTML5 Webcam Videochat
Description
The 2Way VideoCalls and Random Chat - HTML5 Webcam Videochat WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the `vws_notice` function found in the ~/inc/requirements.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 5.2.7.
AI-Powered Analysis
Technical Analysis
CVE-2021-34656 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin '2Way VideoCalls and Random Chat - HTML5 Webcam Videochat', specifically in versions up to and including 5.2.7. The vulnerability arises from improper sanitization of user-supplied input in the `vws_notice` function located in the ~/inc/requirements.php file. This flaw allows an attacker to inject arbitrary JavaScript code that is reflected back to the user without adequate validation or encoding. When a victim visits a crafted URL or interacts with a maliciously crafted input, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or other malicious actions. The vulnerability is classified under CWE-79, which pertains to Cross-Site Scripting issues. According to the CVSS v3.1 scoring, this vulnerability has a score of 6.1 (medium severity) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. This indicates that the attack can be performed remotely over the network without privileges, requires low attack complexity, does not require authentication, but does require user interaction (clicking a malicious link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the security scope of the vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not affect availability. No known exploits in the wild have been reported, and no official patches are linked in the provided data, though it is recommended to check for updates or vendor advisories. The vulnerability is particularly relevant for websites using this specific WordPress plugin to provide video call and chat functionality, which may be targeted by attackers to compromise users or site administrators.
Potential Impact
For European organizations, the impact of this vulnerability can be significant depending on the usage of the affected plugin. Organizations running WordPress sites with the '2Way VideoCalls and Random Chat - HTML5 Webcam Videochat' plugin expose their users and administrators to potential session hijacking, theft of sensitive information, or unauthorized actions performed via injected scripts. This can lead to compromised user accounts, data leakage, and reputational damage. Since the vulnerability requires user interaction, phishing campaigns targeting employees or customers could exploit this flaw to gain unauthorized access or spread malware. Additionally, the scope change in the vulnerability indicates that the attacker could potentially escalate the impact beyond the immediate plugin context, possibly affecting other parts of the website or connected systems. For sectors such as finance, healthcare, or government within Europe, where data protection regulations like GDPR are stringent, exploitation of this vulnerability could result in regulatory penalties and loss of trust. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities after disclosure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should take the following specific actions: 1) Immediately identify and inventory WordPress sites using the affected plugin version (up to 5.2.7). 2) Update the plugin to the latest available version where the vulnerability is fixed; if no patch is available, consider disabling or removing the plugin until a fix is released. 3) Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the vulnerable parameter `vws_notice`. 4) Conduct user awareness training to reduce the risk of successful phishing attacks that could exploit this vulnerability. 5) Review and harden Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 6) Monitor web server and application logs for suspicious requests containing script injection attempts. 7) Employ security plugins that sanitize inputs and outputs to add an additional layer of defense. 8) Regularly audit and test web applications for XSS and other injection vulnerabilities to proactively identify security gaps. These steps go beyond generic advice by focusing on plugin-specific actions, detection, and user education tailored to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdaf66
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/6/2025, 8:39:36 PM
Last updated: 7/29/2025, 2:44:03 AM
Views: 12
Related Threats
CVE-2025-8991: Business Logic Errors in linlinjava litemall
MediumCVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-8940: Buffer Overflow in Tenda AC20
HighCVE-2025-8939: Buffer Overflow in Tenda AC20
HighCVE-2025-50518: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.