Skip to main content

CVE-2021-34661: CWE-352 Cross-Site Request Forgery (CSRF) in Very Good Plugins WP Fusion Lite

Medium
VulnerabilityCVE-2021-34661cvecve-2021-34661cwe-352
Published: Mon Aug 09 2021 (08/09/2021, 12:23:20 UTC)
Source: CVE
Vendor/Project: Very Good Plugins
Product: WP Fusion Lite

Description

The WP Fusion Lite WordPress plugin is vulnerable to Cross-Site Request Forgery via the `show_logs_section` function found in the ~/includes/admin/logging/class-log-handler.php file which allows attackers to drop all logs for the plugin, in versions up to and including 3.37.18.

AI-Powered Analysis

AILast updated: 07/08/2025, 20:59:16 UTC

Technical Analysis

CVE-2021-34661 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the WP Fusion Lite plugin for WordPress, specifically versions up to and including 3.37.18. The vulnerability resides in the `show_logs_section` function within the file ~/includes/admin/logging/class-log-handler.php. This function can be exploited by an attacker to trigger unauthorized actions that result in the deletion of all plugin logs. The vulnerability is classified under CWE-352, which refers to CSRF attacks where an attacker tricks an authenticated user into submitting a forged HTTP request, thereby performing unwanted actions on a web application where the user is authenticated. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L) reveals that the attack can be performed remotely over the network without privileges or authentication, but requires user interaction (UI:R). The impact includes integrity and availability loss, as logs can be deleted, potentially hindering forensic investigations and operational monitoring. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. No known exploits in the wild have been reported, and no official patches or updates are linked in the provided data, although it is recommended to check for updates from the vendor. The vulnerability is particularly relevant for administrators and security teams managing WordPress sites using WP Fusion Lite, as log integrity is critical for security monitoring and incident response.

Potential Impact

For European organizations using WordPress with the WP Fusion Lite plugin, this vulnerability poses a risk to the integrity and availability of security logs. Logs are essential for detecting suspicious activities, auditing, and compliance with regulations such as GDPR, which mandates proper data protection and incident response capabilities. An attacker exploiting this CSRF flaw could erase logs, potentially covering tracks of malicious activities or disrupting monitoring processes. This could delay detection of breaches or unauthorized access, increasing the risk of data loss or further compromise. Organizations in sectors with strict compliance requirements, such as finance, healthcare, and government, may face regulatory repercussions if log tampering leads to undetected incidents. Additionally, the ease of exploitation without authentication but requiring user interaction means phishing or social engineering could be leveraged to trigger the attack. The impact on availability is moderate but significant enough to affect operational security and forensic readiness.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately update WP Fusion Lite to the latest version if a patch addressing CVE-2021-34661 is available from Very Good Plugins. 2) If no patch is available, implement compensating controls such as disabling or restricting access to the affected logging functionality, especially for users with administrative privileges. 3) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting the plugin’s endpoints. 4) Enforce strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF risks. 5) Educate users and administrators about phishing and social engineering risks to prevent inadvertent triggering of CSRF attacks. 6) Regularly back up logs and critical data to secure, immutable storage to ensure recovery in case of tampering. 7) Monitor logs and system behavior for unusual deletion or modification activities to detect exploitation attempts early. 8) Review and harden WordPress security configurations, including limiting plugin usage to trusted and actively maintained plugins.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-06-10T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6830d8f30acd01a2492755f7

Added to database: 5/23/2025, 8:22:11 PM

Last enriched: 7/8/2025, 8:59:16 PM

Last updated: 7/30/2025, 8:28:40 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats