Skip to main content

CVE-2021-34668: CWE-79 Cross-site Scripting (XSS) in devowl.io WordPress Real Media Library

Medium
VulnerabilityCVE-2021-34668cvecve-2021-34668cwe-79
Published: Mon Aug 30 2021 (08/30/2021, 18:03:49 UTC)
Source: CVE
Vendor/Project: devowl.io
Product: WordPress Real Media Library

Description

The WordPress Real Media Library WordPress plugin is vulnerable to Stored Cross-Site Scripting via the name parameter in the ~/inc/overrides/lite/rest/Folder.php file which allows author-level attackers to inject arbitrary web scripts in folder names, in versions up to and including 4.14.1.

AI-Powered Analysis

AILast updated: 07/07/2025, 01:09:34 UTC

Technical Analysis

CVE-2021-34668 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WordPress Real Media Library plugin developed by devowl.io, specifically affecting versions up to and including 4.14.1. The vulnerability arises from insufficient sanitization of the 'name' parameter in the ~/inc/overrides/lite/rest/Folder.php file. This flaw allows an attacker with author-level privileges to inject arbitrary malicious JavaScript code into folder names within the plugin's media library management interface. Because the XSS is stored, the malicious script persists in the database and executes whenever an affected page or interface element is loaded by users with access, potentially including administrators. The vulnerability requires no user interaction beyond loading the affected page and does not require higher privileges than author-level, which is a relatively low privilege tier in WordPress. The CVSS v3.1 base score is 6.4 (medium severity), reflecting network exploitability (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and a scope change (S:C) indicating that the vulnerability can affect resources beyond the initially vulnerable component. The impact includes partial confidentiality and integrity loss, as the injected scripts can steal sensitive information such as cookies or session tokens, manipulate page content, or perform actions on behalf of users with elevated privileges. There are no known exploits in the wild as of the published date (August 30, 2021), and no official patches linked in the provided data, though it is likely that the vendor has addressed this in subsequent releases. This vulnerability is particularly relevant for WordPress sites using the Real Media Library plugin, which is popular for organizing media files in a more user-friendly manner. Since the attack vector requires author-level access, it is critical to control user roles and permissions carefully to prevent exploitation.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites and intranet portals running WordPress with the Real Media Library plugin installed. Exploitation could lead to unauthorized script execution within the context of the affected site, enabling attackers to hijack user sessions, steal sensitive data, or perform unauthorized actions with the privileges of compromised users. This can result in data breaches, defacement, or further compromise of internal systems if administrative users are targeted. Given the widespread use of WordPress across European businesses, including SMEs and larger enterprises, the vulnerability could impact sectors such as e-commerce, media, education, and government agencies that rely on WordPress for content management. The stored nature of the XSS increases the risk as malicious payloads persist and affect multiple users. Additionally, the scope change in the CVSS vector indicates that the vulnerability could affect components beyond the plugin itself, potentially impacting other integrated systems or plugins. The lack of known exploits reduces immediate risk, but the ease of exploitation by any author-level user means insider threats or compromised accounts could leverage this vulnerability effectively.

Mitigation Recommendations

European organizations should take the following specific actions: 1) Immediately audit WordPress installations to identify if the Real Media Library plugin is installed and determine the version in use. 2) Upgrade the plugin to the latest version where the vulnerability is patched; if no patch is available, consider disabling or uninstalling the plugin until a fix is released. 3) Restrict author-level privileges strictly to trusted users and review user roles to minimize the number of users with author or higher privileges. 4) Implement Web Application Firewall (WAF) rules that detect and block suspicious script injections in folder names or other input fields related to media management. 5) Conduct regular security training for content authors and administrators to recognize potential malicious activity and enforce strong authentication mechanisms such as MFA to reduce account compromise risk. 6) Monitor logs for unusual activity related to media library folder creation or modification. 7) Consider deploying Content Security Policy (CSP) headers to limit the impact of any injected scripts by restricting the sources from which scripts can be loaded. 8) Perform regular vulnerability scans and penetration tests focusing on WordPress plugins to detect similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-06-10T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc925

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 1:09:34 AM

Last updated: 8/7/2025, 3:57:41 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats