CVE-2021-34660: CWE-79 Cross-site Scripting (XSS) in Very Good Plugins WP Fusion Lite
The WP Fusion Lite WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the startdate parameter found in the ~/includes/admin/logging/class-log-table-list.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.37.18.
AI Analysis
Technical Summary
CVE-2021-34660 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WP Fusion Lite WordPress plugin developed by Very Good Plugins. The vulnerability exists in versions up to and including 3.37.18, specifically within the handling of the 'startdate' parameter in the file ~/includes/admin/logging/class-log-table-list.php. Reflected XSS occurs when user-supplied input is immediately returned by a web application without proper sanitization or encoding, allowing attackers to inject malicious scripts into web pages viewed by other users. In this case, an attacker can craft a URL containing malicious JavaScript code in the 'startdate' parameter, which when accessed by an administrator or user with appropriate privileges, executes in their browser context. This can lead to theft of session cookies, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The vector indicates it is remotely exploitable over the network without privileges but requires user interaction (clicking a crafted link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the confidentiality and integrity of data. No known exploits have been reported in the wild, and no official patches are linked in the provided data, though it is likely that plugin updates have addressed this issue since its publication in August 2021. The vulnerability falls under CWE-79, a common and well-understood class of web application security flaws.
Potential Impact
For European organizations using WordPress sites with the WP Fusion Lite plugin version 3.37.18 or earlier, this vulnerability poses a risk primarily to site administrators or users with access to the affected admin interface. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, unauthorized access to sensitive data, or manipulation of site content. This can undermine the confidentiality and integrity of organizational data and user information. Given the widespread use of WordPress across Europe for corporate, governmental, and e-commerce websites, exploitation could disrupt business operations, damage reputation, and result in regulatory non-compliance, especially under GDPR requirements for protecting personal data. However, the requirement for user interaction and the reflected nature of the XSS limits the attack surface compared to stored XSS vulnerabilities. The absence of known active exploitation reduces immediate risk but does not eliminate the threat, especially if attackers develop automated phishing campaigns targeting European organizations.
Mitigation Recommendations
European organizations should immediately verify the version of WP Fusion Lite installed on their WordPress sites and upgrade to the latest patched version if available. If an update is not yet released, temporary mitigations include implementing Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'startdate' parameter. Input validation and output encoding should be enforced on all user-supplied data within the plugin's codebase. Administrators should be trained to recognize suspicious URLs and avoid clicking untrusted links. Additionally, Content Security Policy (CSP) headers can be deployed to restrict the execution of unauthorized scripts in browsers. Regular security audits and vulnerability scanning of WordPress plugins should be incorporated into organizational security practices. Monitoring logs for unusual access patterns to the affected admin pages can help detect attempted exploitation. Finally, organizations should ensure that multi-factor authentication (MFA) is enabled for administrative accounts to reduce the impact of potential session hijacking.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2021-34660: CWE-79 Cross-site Scripting (XSS) in Very Good Plugins WP Fusion Lite
Description
The WP Fusion Lite WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the startdate parameter found in the ~/includes/admin/logging/class-log-table-list.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.37.18.
AI-Powered Analysis
Technical Analysis
CVE-2021-34660 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WP Fusion Lite WordPress plugin developed by Very Good Plugins. The vulnerability exists in versions up to and including 3.37.18, specifically within the handling of the 'startdate' parameter in the file ~/includes/admin/logging/class-log-table-list.php. Reflected XSS occurs when user-supplied input is immediately returned by a web application without proper sanitization or encoding, allowing attackers to inject malicious scripts into web pages viewed by other users. In this case, an attacker can craft a URL containing malicious JavaScript code in the 'startdate' parameter, which when accessed by an administrator or user with appropriate privileges, executes in their browser context. This can lead to theft of session cookies, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The vector indicates it is remotely exploitable over the network without privileges but requires user interaction (clicking a crafted link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the confidentiality and integrity of data. No known exploits have been reported in the wild, and no official patches are linked in the provided data, though it is likely that plugin updates have addressed this issue since its publication in August 2021. The vulnerability falls under CWE-79, a common and well-understood class of web application security flaws.
Potential Impact
For European organizations using WordPress sites with the WP Fusion Lite plugin version 3.37.18 or earlier, this vulnerability poses a risk primarily to site administrators or users with access to the affected admin interface. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, unauthorized access to sensitive data, or manipulation of site content. This can undermine the confidentiality and integrity of organizational data and user information. Given the widespread use of WordPress across Europe for corporate, governmental, and e-commerce websites, exploitation could disrupt business operations, damage reputation, and result in regulatory non-compliance, especially under GDPR requirements for protecting personal data. However, the requirement for user interaction and the reflected nature of the XSS limits the attack surface compared to stored XSS vulnerabilities. The absence of known active exploitation reduces immediate risk but does not eliminate the threat, especially if attackers develop automated phishing campaigns targeting European organizations.
Mitigation Recommendations
European organizations should immediately verify the version of WP Fusion Lite installed on their WordPress sites and upgrade to the latest patched version if available. If an update is not yet released, temporary mitigations include implementing Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'startdate' parameter. Input validation and output encoding should be enforced on all user-supplied data within the plugin's codebase. Administrators should be trained to recognize suspicious URLs and avoid clicking untrusted links. Additionally, Content Security Policy (CSP) headers can be deployed to restrict the execution of unauthorized scripts in browsers. Regular security audits and vulnerability scanning of WordPress plugins should be incorporated into organizational security practices. Monitoring logs for unusual access patterns to the affected admin pages can help detect attempted exploitation. Finally, organizations should ensure that multi-factor authentication (MFA) is enabled for administrative accounts to reduce the impact of potential session hijacking.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6830d8f30acd01a2492755f5
Added to database: 5/23/2025, 8:22:11 PM
Last enriched: 7/8/2025, 8:58:52 PM
Last updated: 2/7/2026, 6:49:51 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.