CVE-2021-34660: CWE-79 Cross-site Scripting (XSS) in Very Good Plugins WP Fusion Lite
The WP Fusion Lite WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the startdate parameter found in the ~/includes/admin/logging/class-log-table-list.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.37.18.
AI Analysis
Technical Summary
CVE-2021-34660 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WP Fusion Lite WordPress plugin developed by Very Good Plugins. The vulnerability exists in versions up to and including 3.37.18, specifically within the handling of the 'startdate' parameter in the file ~/includes/admin/logging/class-log-table-list.php. Reflected XSS occurs when user-supplied input is immediately returned by a web application without proper sanitization or encoding, allowing attackers to inject malicious scripts into web pages viewed by other users. In this case, an attacker can craft a URL containing malicious JavaScript code in the 'startdate' parameter, which when accessed by an administrator or user with appropriate privileges, executes in their browser context. This can lead to theft of session cookies, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The vector indicates it is remotely exploitable over the network without privileges but requires user interaction (clicking a crafted link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the confidentiality and integrity of data. No known exploits have been reported in the wild, and no official patches are linked in the provided data, though it is likely that plugin updates have addressed this issue since its publication in August 2021. The vulnerability falls under CWE-79, a common and well-understood class of web application security flaws.
Potential Impact
For European organizations using WordPress sites with the WP Fusion Lite plugin version 3.37.18 or earlier, this vulnerability poses a risk primarily to site administrators or users with access to the affected admin interface. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, unauthorized access to sensitive data, or manipulation of site content. This can undermine the confidentiality and integrity of organizational data and user information. Given the widespread use of WordPress across Europe for corporate, governmental, and e-commerce websites, exploitation could disrupt business operations, damage reputation, and result in regulatory non-compliance, especially under GDPR requirements for protecting personal data. However, the requirement for user interaction and the reflected nature of the XSS limits the attack surface compared to stored XSS vulnerabilities. The absence of known active exploitation reduces immediate risk but does not eliminate the threat, especially if attackers develop automated phishing campaigns targeting European organizations.
Mitigation Recommendations
European organizations should immediately verify the version of WP Fusion Lite installed on their WordPress sites and upgrade to the latest patched version if available. If an update is not yet released, temporary mitigations include implementing Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'startdate' parameter. Input validation and output encoding should be enforced on all user-supplied data within the plugin's codebase. Administrators should be trained to recognize suspicious URLs and avoid clicking untrusted links. Additionally, Content Security Policy (CSP) headers can be deployed to restrict the execution of unauthorized scripts in browsers. Regular security audits and vulnerability scanning of WordPress plugins should be incorporated into organizational security practices. Monitoring logs for unusual access patterns to the affected admin pages can help detect attempted exploitation. Finally, organizations should ensure that multi-factor authentication (MFA) is enabled for administrative accounts to reduce the impact of potential session hijacking.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2021-34660: CWE-79 Cross-site Scripting (XSS) in Very Good Plugins WP Fusion Lite
Description
The WP Fusion Lite WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the startdate parameter found in the ~/includes/admin/logging/class-log-table-list.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.37.18.
AI-Powered Analysis
Technical Analysis
CVE-2021-34660 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WP Fusion Lite WordPress plugin developed by Very Good Plugins. The vulnerability exists in versions up to and including 3.37.18, specifically within the handling of the 'startdate' parameter in the file ~/includes/admin/logging/class-log-table-list.php. Reflected XSS occurs when user-supplied input is immediately returned by a web application without proper sanitization or encoding, allowing attackers to inject malicious scripts into web pages viewed by other users. In this case, an attacker can craft a URL containing malicious JavaScript code in the 'startdate' parameter, which when accessed by an administrator or user with appropriate privileges, executes in their browser context. This can lead to theft of session cookies, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The vector indicates it is remotely exploitable over the network without privileges but requires user interaction (clicking a crafted link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the confidentiality and integrity of data. No known exploits have been reported in the wild, and no official patches are linked in the provided data, though it is likely that plugin updates have addressed this issue since its publication in August 2021. The vulnerability falls under CWE-79, a common and well-understood class of web application security flaws.
Potential Impact
For European organizations using WordPress sites with the WP Fusion Lite plugin version 3.37.18 or earlier, this vulnerability poses a risk primarily to site administrators or users with access to the affected admin interface. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, unauthorized access to sensitive data, or manipulation of site content. This can undermine the confidentiality and integrity of organizational data and user information. Given the widespread use of WordPress across Europe for corporate, governmental, and e-commerce websites, exploitation could disrupt business operations, damage reputation, and result in regulatory non-compliance, especially under GDPR requirements for protecting personal data. However, the requirement for user interaction and the reflected nature of the XSS limits the attack surface compared to stored XSS vulnerabilities. The absence of known active exploitation reduces immediate risk but does not eliminate the threat, especially if attackers develop automated phishing campaigns targeting European organizations.
Mitigation Recommendations
European organizations should immediately verify the version of WP Fusion Lite installed on their WordPress sites and upgrade to the latest patched version if available. If an update is not yet released, temporary mitigations include implementing Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'startdate' parameter. Input validation and output encoding should be enforced on all user-supplied data within the plugin's codebase. Administrators should be trained to recognize suspicious URLs and avoid clicking untrusted links. Additionally, Content Security Policy (CSP) headers can be deployed to restrict the execution of unauthorized scripts in browsers. Regular security audits and vulnerability scanning of WordPress plugins should be incorporated into organizational security practices. Monitoring logs for unusual access patterns to the affected admin pages can help detect attempted exploitation. Finally, organizations should ensure that multi-factor authentication (MFA) is enabled for administrative accounts to reduce the impact of potential session hijacking.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6830d8f30acd01a2492755f5
Added to database: 5/23/2025, 8:22:11 PM
Last enriched: 7/8/2025, 8:58:52 PM
Last updated: 8/17/2025, 12:10:01 PM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.