CVE-2021-34661: CWE-352 Cross-Site Request Forgery (CSRF) in Very Good Plugins WP Fusion Lite
The WP Fusion Lite WordPress plugin is vulnerable to Cross-Site Request Forgery via the `show_logs_section` function found in the ~/includes/admin/logging/class-log-handler.php file which allows attackers to drop all logs for the plugin, in versions up to and including 3.37.18.
AI Analysis
Technical Summary
CVE-2021-34661 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the WP Fusion Lite plugin for WordPress, specifically versions up to and including 3.37.18. The vulnerability resides in the `show_logs_section` function within the file ~/includes/admin/logging/class-log-handler.php. This function can be exploited by an attacker to trigger unauthorized actions that result in the deletion of all plugin logs. The vulnerability is classified under CWE-352, which refers to CSRF attacks where an attacker tricks an authenticated user into submitting a forged HTTP request, thereby performing unwanted actions on a web application where the user is authenticated. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L) reveals that the attack can be performed remotely over the network without privileges or authentication, but requires user interaction (UI:R). The impact includes integrity and availability loss, as logs can be deleted, potentially hindering forensic investigations and operational monitoring. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. No known exploits in the wild have been reported, and no official patches or updates are linked in the provided data, although it is recommended to check for updates from the vendor. The vulnerability is particularly relevant for administrators and security teams managing WordPress sites using WP Fusion Lite, as log integrity is critical for security monitoring and incident response.
Potential Impact
For European organizations using WordPress with the WP Fusion Lite plugin, this vulnerability poses a risk to the integrity and availability of security logs. Logs are essential for detecting suspicious activities, auditing, and compliance with regulations such as GDPR, which mandates proper data protection and incident response capabilities. An attacker exploiting this CSRF flaw could erase logs, potentially covering tracks of malicious activities or disrupting monitoring processes. This could delay detection of breaches or unauthorized access, increasing the risk of data loss or further compromise. Organizations in sectors with strict compliance requirements, such as finance, healthcare, and government, may face regulatory repercussions if log tampering leads to undetected incidents. Additionally, the ease of exploitation without authentication but requiring user interaction means phishing or social engineering could be leveraged to trigger the attack. The impact on availability is moderate but significant enough to affect operational security and forensic readiness.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update WP Fusion Lite to the latest version if a patch addressing CVE-2021-34661 is available from Very Good Plugins. 2) If no patch is available, implement compensating controls such as disabling or restricting access to the affected logging functionality, especially for users with administrative privileges. 3) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting the plugin’s endpoints. 4) Enforce strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF risks. 5) Educate users and administrators about phishing and social engineering risks to prevent inadvertent triggering of CSRF attacks. 6) Regularly back up logs and critical data to secure, immutable storage to ensure recovery in case of tampering. 7) Monitor logs and system behavior for unusual deletion or modification activities to detect exploitation attempts early. 8) Review and harden WordPress security configurations, including limiting plugin usage to trusted and actively maintained plugins.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-34661: CWE-352 Cross-Site Request Forgery (CSRF) in Very Good Plugins WP Fusion Lite
Description
The WP Fusion Lite WordPress plugin is vulnerable to Cross-Site Request Forgery via the `show_logs_section` function found in the ~/includes/admin/logging/class-log-handler.php file which allows attackers to drop all logs for the plugin, in versions up to and including 3.37.18.
AI-Powered Analysis
Technical Analysis
CVE-2021-34661 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the WP Fusion Lite plugin for WordPress, specifically versions up to and including 3.37.18. The vulnerability resides in the `show_logs_section` function within the file ~/includes/admin/logging/class-log-handler.php. This function can be exploited by an attacker to trigger unauthorized actions that result in the deletion of all plugin logs. The vulnerability is classified under CWE-352, which refers to CSRF attacks where an attacker tricks an authenticated user into submitting a forged HTTP request, thereby performing unwanted actions on a web application where the user is authenticated. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L) reveals that the attack can be performed remotely over the network without privileges or authentication, but requires user interaction (UI:R). The impact includes integrity and availability loss, as logs can be deleted, potentially hindering forensic investigations and operational monitoring. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. No known exploits in the wild have been reported, and no official patches or updates are linked in the provided data, although it is recommended to check for updates from the vendor. The vulnerability is particularly relevant for administrators and security teams managing WordPress sites using WP Fusion Lite, as log integrity is critical for security monitoring and incident response.
Potential Impact
For European organizations using WordPress with the WP Fusion Lite plugin, this vulnerability poses a risk to the integrity and availability of security logs. Logs are essential for detecting suspicious activities, auditing, and compliance with regulations such as GDPR, which mandates proper data protection and incident response capabilities. An attacker exploiting this CSRF flaw could erase logs, potentially covering tracks of malicious activities or disrupting monitoring processes. This could delay detection of breaches or unauthorized access, increasing the risk of data loss or further compromise. Organizations in sectors with strict compliance requirements, such as finance, healthcare, and government, may face regulatory repercussions if log tampering leads to undetected incidents. Additionally, the ease of exploitation without authentication but requiring user interaction means phishing or social engineering could be leveraged to trigger the attack. The impact on availability is moderate but significant enough to affect operational security and forensic readiness.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update WP Fusion Lite to the latest version if a patch addressing CVE-2021-34661 is available from Very Good Plugins. 2) If no patch is available, implement compensating controls such as disabling or restricting access to the affected logging functionality, especially for users with administrative privileges. 3) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting the plugin’s endpoints. 4) Enforce strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF risks. 5) Educate users and administrators about phishing and social engineering risks to prevent inadvertent triggering of CSRF attacks. 6) Regularly back up logs and critical data to secure, immutable storage to ensure recovery in case of tampering. 7) Monitor logs and system behavior for unusual deletion or modification activities to detect exploitation attempts early. 8) Review and harden WordPress security configurations, including limiting plugin usage to trusted and actively maintained plugins.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6830d8f30acd01a2492755f7
Added to database: 5/23/2025, 8:22:11 PM
Last enriched: 7/8/2025, 8:59:16 PM
Last updated: 2/7/2026, 10:27:10 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.