Skip to main content

CVE-2021-34656: CWE-79 Cross-site Scripting (XSS) in 2Way VideoCalls and Random Chat - HTML5 Webcam Videochat 2Way VideoCalls and Random Chat - HTML5 Webcam Videochat

Medium
VulnerabilityCVE-2021-34656cvecve-2021-34656cwe-79
Published: Mon Aug 16 2021 (08/16/2021, 18:22:33 UTC)
Source: CVE
Vendor/Project: 2Way VideoCalls and Random Chat - HTML5 Webcam Videochat
Product: 2Way VideoCalls and Random Chat - HTML5 Webcam Videochat

Description

The 2Way VideoCalls and Random Chat - HTML5 Webcam Videochat WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the `vws_notice` function found in the ~/inc/requirements.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 5.2.7.

AI-Powered Analysis

AILast updated: 07/06/2025, 20:39:36 UTC

Technical Analysis

CVE-2021-34656 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin '2Way VideoCalls and Random Chat - HTML5 Webcam Videochat', specifically in versions up to and including 5.2.7. The vulnerability arises from improper sanitization of user-supplied input in the `vws_notice` function located in the ~/inc/requirements.php file. This flaw allows an attacker to inject arbitrary JavaScript code that is reflected back to the user without adequate validation or encoding. When a victim visits a crafted URL or interacts with a maliciously crafted input, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or other malicious actions. The vulnerability is classified under CWE-79, which pertains to Cross-Site Scripting issues. According to the CVSS v3.1 scoring, this vulnerability has a score of 6.1 (medium severity) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. This indicates that the attack can be performed remotely over the network without privileges, requires low attack complexity, does not require authentication, but does require user interaction (clicking a malicious link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the security scope of the vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not affect availability. No known exploits in the wild have been reported, and no official patches are linked in the provided data, though it is recommended to check for updates or vendor advisories. The vulnerability is particularly relevant for websites using this specific WordPress plugin to provide video call and chat functionality, which may be targeted by attackers to compromise users or site administrators.

Potential Impact

For European organizations, the impact of this vulnerability can be significant depending on the usage of the affected plugin. Organizations running WordPress sites with the '2Way VideoCalls and Random Chat - HTML5 Webcam Videochat' plugin expose their users and administrators to potential session hijacking, theft of sensitive information, or unauthorized actions performed via injected scripts. This can lead to compromised user accounts, data leakage, and reputational damage. Since the vulnerability requires user interaction, phishing campaigns targeting employees or customers could exploit this flaw to gain unauthorized access or spread malware. Additionally, the scope change in the vulnerability indicates that the attacker could potentially escalate the impact beyond the immediate plugin context, possibly affecting other parts of the website or connected systems. For sectors such as finance, healthcare, or government within Europe, where data protection regulations like GDPR are stringent, exploitation of this vulnerability could result in regulatory penalties and loss of trust. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities after disclosure.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should take the following specific actions: 1) Immediately identify and inventory WordPress sites using the affected plugin version (up to 5.2.7). 2) Update the plugin to the latest available version where the vulnerability is fixed; if no patch is available, consider disabling or removing the plugin until a fix is released. 3) Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the vulnerable parameter `vws_notice`. 4) Conduct user awareness training to reduce the risk of successful phishing attacks that could exploit this vulnerability. 5) Review and harden Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 6) Monitor web server and application logs for suspicious requests containing script injection attempts. 7) Employ security plugins that sanitize inputs and outputs to add an additional layer of defense. 8) Regularly audit and test web applications for XSS and other injection vulnerabilities to proactively identify security gaps. These steps go beyond generic advice by focusing on plugin-specific actions, detection, and user education tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-06-10T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdaf66

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 8:39:36 PM

Last updated: 7/29/2025, 2:44:03 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats