CVE-2021-34661: CWE-352 Cross-Site Request Forgery (CSRF) in Very Good Plugins WP Fusion Lite
The WP Fusion Lite WordPress plugin is vulnerable to Cross-Site Request Forgery via the `show_logs_section` function found in the ~/includes/admin/logging/class-log-handler.php file which allows attackers to drop all logs for the plugin, in versions up to and including 3.37.18.
AI Analysis
Technical Summary
CVE-2021-34661 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the WP Fusion Lite plugin for WordPress, specifically versions up to and including 3.37.18. The vulnerability resides in the `show_logs_section` function within the file ~/includes/admin/logging/class-log-handler.php. This function can be exploited by an attacker to trigger unauthorized actions that result in the deletion of all plugin logs. The vulnerability is classified under CWE-352, which refers to CSRF attacks where an attacker tricks an authenticated user into submitting a forged HTTP request, thereby performing unwanted actions on a web application where the user is authenticated. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L) reveals that the attack can be performed remotely over the network without privileges or authentication, but requires user interaction (UI:R). The impact includes integrity and availability loss, as logs can be deleted, potentially hindering forensic investigations and operational monitoring. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. No known exploits in the wild have been reported, and no official patches or updates are linked in the provided data, although it is recommended to check for updates from the vendor. The vulnerability is particularly relevant for administrators and security teams managing WordPress sites using WP Fusion Lite, as log integrity is critical for security monitoring and incident response.
Potential Impact
For European organizations using WordPress with the WP Fusion Lite plugin, this vulnerability poses a risk to the integrity and availability of security logs. Logs are essential for detecting suspicious activities, auditing, and compliance with regulations such as GDPR, which mandates proper data protection and incident response capabilities. An attacker exploiting this CSRF flaw could erase logs, potentially covering tracks of malicious activities or disrupting monitoring processes. This could delay detection of breaches or unauthorized access, increasing the risk of data loss or further compromise. Organizations in sectors with strict compliance requirements, such as finance, healthcare, and government, may face regulatory repercussions if log tampering leads to undetected incidents. Additionally, the ease of exploitation without authentication but requiring user interaction means phishing or social engineering could be leveraged to trigger the attack. The impact on availability is moderate but significant enough to affect operational security and forensic readiness.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update WP Fusion Lite to the latest version if a patch addressing CVE-2021-34661 is available from Very Good Plugins. 2) If no patch is available, implement compensating controls such as disabling or restricting access to the affected logging functionality, especially for users with administrative privileges. 3) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting the plugin’s endpoints. 4) Enforce strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF risks. 5) Educate users and administrators about phishing and social engineering risks to prevent inadvertent triggering of CSRF attacks. 6) Regularly back up logs and critical data to secure, immutable storage to ensure recovery in case of tampering. 7) Monitor logs and system behavior for unusual deletion or modification activities to detect exploitation attempts early. 8) Review and harden WordPress security configurations, including limiting plugin usage to trusted and actively maintained plugins.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-34661: CWE-352 Cross-Site Request Forgery (CSRF) in Very Good Plugins WP Fusion Lite
Description
The WP Fusion Lite WordPress plugin is vulnerable to Cross-Site Request Forgery via the `show_logs_section` function found in the ~/includes/admin/logging/class-log-handler.php file which allows attackers to drop all logs for the plugin, in versions up to and including 3.37.18.
AI-Powered Analysis
Technical Analysis
CVE-2021-34661 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the WP Fusion Lite plugin for WordPress, specifically versions up to and including 3.37.18. The vulnerability resides in the `show_logs_section` function within the file ~/includes/admin/logging/class-log-handler.php. This function can be exploited by an attacker to trigger unauthorized actions that result in the deletion of all plugin logs. The vulnerability is classified under CWE-352, which refers to CSRF attacks where an attacker tricks an authenticated user into submitting a forged HTTP request, thereby performing unwanted actions on a web application where the user is authenticated. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L) reveals that the attack can be performed remotely over the network without privileges or authentication, but requires user interaction (UI:R). The impact includes integrity and availability loss, as logs can be deleted, potentially hindering forensic investigations and operational monitoring. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. No known exploits in the wild have been reported, and no official patches or updates are linked in the provided data, although it is recommended to check for updates from the vendor. The vulnerability is particularly relevant for administrators and security teams managing WordPress sites using WP Fusion Lite, as log integrity is critical for security monitoring and incident response.
Potential Impact
For European organizations using WordPress with the WP Fusion Lite plugin, this vulnerability poses a risk to the integrity and availability of security logs. Logs are essential for detecting suspicious activities, auditing, and compliance with regulations such as GDPR, which mandates proper data protection and incident response capabilities. An attacker exploiting this CSRF flaw could erase logs, potentially covering tracks of malicious activities or disrupting monitoring processes. This could delay detection of breaches or unauthorized access, increasing the risk of data loss or further compromise. Organizations in sectors with strict compliance requirements, such as finance, healthcare, and government, may face regulatory repercussions if log tampering leads to undetected incidents. Additionally, the ease of exploitation without authentication but requiring user interaction means phishing or social engineering could be leveraged to trigger the attack. The impact on availability is moderate but significant enough to affect operational security and forensic readiness.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update WP Fusion Lite to the latest version if a patch addressing CVE-2021-34661 is available from Very Good Plugins. 2) If no patch is available, implement compensating controls such as disabling or restricting access to the affected logging functionality, especially for users with administrative privileges. 3) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting the plugin’s endpoints. 4) Enforce strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF risks. 5) Educate users and administrators about phishing and social engineering risks to prevent inadvertent triggering of CSRF attacks. 6) Regularly back up logs and critical data to secure, immutable storage to ensure recovery in case of tampering. 7) Monitor logs and system behavior for unusual deletion or modification activities to detect exploitation attempts early. 8) Review and harden WordPress security configurations, including limiting plugin usage to trusted and actively maintained plugins.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6830d8f30acd01a2492755f7
Added to database: 5/23/2025, 8:22:11 PM
Last enriched: 7/8/2025, 8:59:16 PM
Last updated: 7/30/2025, 8:28:40 PM
Views: 10
Related Threats
CVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumCVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.