CVE-2021-34665: CWE-79 Cross-site Scripting (XSS) in WP SEO Tags WP SEO Tags
The WP SEO Tags WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the saq_txt_the_filter parameter in the ~/wp-seo-tags.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.2.7.
AI Analysis
Technical Summary
CVE-2021-34665 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WP SEO Tags WordPress plugin, specifically affecting versions up to and including 2.2.7. The vulnerability arises from improper sanitization of user-supplied input in the 'saq_txt_the_filter' parameter within the wp-seo-tags.php file. This flaw allows an attacker to inject arbitrary JavaScript code into web pages generated by the plugin. When a victim user visits a crafted URL containing malicious script code in this parameter, the injected script executes in the context of the victim's browser session. This can lead to theft of session cookies, redirection to malicious sites, or execution of unauthorized actions on behalf of the user. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates that the attack can be launched remotely over the network without privileges, requires low attack complexity, no prior authentication, but requires user interaction (clicking a malicious link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component, and the impact includes low confidentiality and integrity impacts but no availability impact. There are no known exploits in the wild reported, and no official patches linked in the provided data, suggesting that users should verify plugin updates or apply manual mitigations. Since WordPress plugins are widely used for SEO enhancements, this vulnerability could be exploited to target site visitors or administrators, potentially leading to session hijacking or phishing attacks.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites with the WP SEO Tags plugin installed. Exploitation could lead to compromise of user sessions, unauthorized actions performed on behalf of logged-in users, or distribution of malicious content to site visitors. This could damage organizational reputation, lead to data breaches involving personal data protected under GDPR, and result in regulatory penalties. The reflected XSS nature means attackers need to trick users into clicking malicious links, which could be distributed via email or social engineering campaigns targeting employees or customers. E-commerce, government, and media websites in Europe using this plugin are particularly at risk, as successful exploitation could facilitate further attacks or data theft. While the vulnerability does not directly affect availability, the confidentiality and integrity impacts could disrupt trust and operational security. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if attackers develop exploits or automate attacks.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Immediately verify if the WP SEO Tags plugin version 2.2.7 or earlier is installed on any WordPress sites under their control. 2) If so, update the plugin to the latest available version where the vulnerability is fixed; if no official patch exists, consider disabling or removing the plugin until a fix is released. 3) Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'saq_txt_the_filter' parameter to prevent exploitation attempts. 4) Conduct security awareness training to educate users about the risks of clicking suspicious links, reducing the likelihood of successful social engineering. 5) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 6) Regularly audit and monitor web server logs for unusual requests containing suspicious parameters or payloads. 7) For sites with sensitive data, consider additional input validation and output encoding on server-side to mitigate XSS risks. 8) Maintain an incident response plan to quickly address any detected exploitation attempts. These steps go beyond generic advice by focusing on plugin-specific detection and response, user education, and layered defenses.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2021-34665: CWE-79 Cross-site Scripting (XSS) in WP SEO Tags WP SEO Tags
Description
The WP SEO Tags WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the saq_txt_the_filter parameter in the ~/wp-seo-tags.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.2.7.
AI-Powered Analysis
Technical Analysis
CVE-2021-34665 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the WP SEO Tags WordPress plugin, specifically affecting versions up to and including 2.2.7. The vulnerability arises from improper sanitization of user-supplied input in the 'saq_txt_the_filter' parameter within the wp-seo-tags.php file. This flaw allows an attacker to inject arbitrary JavaScript code into web pages generated by the plugin. When a victim user visits a crafted URL containing malicious script code in this parameter, the injected script executes in the context of the victim's browser session. This can lead to theft of session cookies, redirection to malicious sites, or execution of unauthorized actions on behalf of the user. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates that the attack can be launched remotely over the network without privileges, requires low attack complexity, no prior authentication, but requires user interaction (clicking a malicious link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component, and the impact includes low confidentiality and integrity impacts but no availability impact. There are no known exploits in the wild reported, and no official patches linked in the provided data, suggesting that users should verify plugin updates or apply manual mitigations. Since WordPress plugins are widely used for SEO enhancements, this vulnerability could be exploited to target site visitors or administrators, potentially leading to session hijacking or phishing attacks.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites with the WP SEO Tags plugin installed. Exploitation could lead to compromise of user sessions, unauthorized actions performed on behalf of logged-in users, or distribution of malicious content to site visitors. This could damage organizational reputation, lead to data breaches involving personal data protected under GDPR, and result in regulatory penalties. The reflected XSS nature means attackers need to trick users into clicking malicious links, which could be distributed via email or social engineering campaigns targeting employees or customers. E-commerce, government, and media websites in Europe using this plugin are particularly at risk, as successful exploitation could facilitate further attacks or data theft. While the vulnerability does not directly affect availability, the confidentiality and integrity impacts could disrupt trust and operational security. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if attackers develop exploits or automate attacks.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Immediately verify if the WP SEO Tags plugin version 2.2.7 or earlier is installed on any WordPress sites under their control. 2) If so, update the plugin to the latest available version where the vulnerability is fixed; if no official patch exists, consider disabling or removing the plugin until a fix is released. 3) Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'saq_txt_the_filter' parameter to prevent exploitation attempts. 4) Conduct security awareness training to educate users about the risks of clicking suspicious links, reducing the likelihood of successful social engineering. 5) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 6) Regularly audit and monitor web server logs for unusual requests containing suspicious parameters or payloads. 7) For sites with sensitive data, consider additional input validation and output encoding on server-side to mitigate XSS risks. 8) Maintain an incident response plan to quickly address any detected exploitation attempts. These steps go beyond generic advice by focusing on plugin-specific detection and response, user education, and layered defenses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6830d58c0acd01a249275507
Added to database: 5/23/2025, 8:07:40 PM
Last enriched: 7/8/2025, 9:00:49 PM
Last updated: 8/15/2025, 8:56:13 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.