CVE-2021-34668: CWE-79 Cross-site Scripting (XSS) in devowl.io WordPress Real Media Library
The WordPress Real Media Library WordPress plugin is vulnerable to Stored Cross-Site Scripting via the name parameter in the ~/inc/overrides/lite/rest/Folder.php file which allows author-level attackers to inject arbitrary web scripts in folder names, in versions up to and including 4.14.1.
AI Analysis
Technical Summary
CVE-2021-34668 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WordPress Real Media Library plugin developed by devowl.io, specifically affecting versions up to and including 4.14.1. The vulnerability arises from insufficient sanitization of the 'name' parameter in the ~/inc/overrides/lite/rest/Folder.php file. This flaw allows an attacker with author-level privileges to inject arbitrary malicious JavaScript code into folder names within the plugin's media library management interface. Because the XSS is stored, the malicious script persists in the database and executes whenever an affected page or interface element is loaded by users with access, potentially including administrators. The vulnerability requires no user interaction beyond loading the affected page and does not require higher privileges than author-level, which is a relatively low privilege tier in WordPress. The CVSS v3.1 base score is 6.4 (medium severity), reflecting network exploitability (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and a scope change (S:C) indicating that the vulnerability can affect resources beyond the initially vulnerable component. The impact includes partial confidentiality and integrity loss, as the injected scripts can steal sensitive information such as cookies or session tokens, manipulate page content, or perform actions on behalf of users with elevated privileges. There are no known exploits in the wild as of the published date (August 30, 2021), and no official patches linked in the provided data, though it is likely that the vendor has addressed this in subsequent releases. This vulnerability is particularly relevant for WordPress sites using the Real Media Library plugin, which is popular for organizing media files in a more user-friendly manner. Since the attack vector requires author-level access, it is critical to control user roles and permissions carefully to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites and intranet portals running WordPress with the Real Media Library plugin installed. Exploitation could lead to unauthorized script execution within the context of the affected site, enabling attackers to hijack user sessions, steal sensitive data, or perform unauthorized actions with the privileges of compromised users. This can result in data breaches, defacement, or further compromise of internal systems if administrative users are targeted. Given the widespread use of WordPress across European businesses, including SMEs and larger enterprises, the vulnerability could impact sectors such as e-commerce, media, education, and government agencies that rely on WordPress for content management. The stored nature of the XSS increases the risk as malicious payloads persist and affect multiple users. Additionally, the scope change in the CVSS vector indicates that the vulnerability could affect components beyond the plugin itself, potentially impacting other integrated systems or plugins. The lack of known exploits reduces immediate risk, but the ease of exploitation by any author-level user means insider threats or compromised accounts could leverage this vulnerability effectively.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Immediately audit WordPress installations to identify if the Real Media Library plugin is installed and determine the version in use. 2) Upgrade the plugin to the latest version where the vulnerability is patched; if no patch is available, consider disabling or uninstalling the plugin until a fix is released. 3) Restrict author-level privileges strictly to trusted users and review user roles to minimize the number of users with author or higher privileges. 4) Implement Web Application Firewall (WAF) rules that detect and block suspicious script injections in folder names or other input fields related to media management. 5) Conduct regular security training for content authors and administrators to recognize potential malicious activity and enforce strong authentication mechanisms such as MFA to reduce account compromise risk. 6) Monitor logs for unusual activity related to media library folder creation or modification. 7) Consider deploying Content Security Policy (CSP) headers to limit the impact of any injected scripts by restricting the sources from which scripts can be loaded. 8) Perform regular vulnerability scans and penetration tests focusing on WordPress plugins to detect similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-34668: CWE-79 Cross-site Scripting (XSS) in devowl.io WordPress Real Media Library
Description
The WordPress Real Media Library WordPress plugin is vulnerable to Stored Cross-Site Scripting via the name parameter in the ~/inc/overrides/lite/rest/Folder.php file which allows author-level attackers to inject arbitrary web scripts in folder names, in versions up to and including 4.14.1.
AI-Powered Analysis
Technical Analysis
CVE-2021-34668 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WordPress Real Media Library plugin developed by devowl.io, specifically affecting versions up to and including 4.14.1. The vulnerability arises from insufficient sanitization of the 'name' parameter in the ~/inc/overrides/lite/rest/Folder.php file. This flaw allows an attacker with author-level privileges to inject arbitrary malicious JavaScript code into folder names within the plugin's media library management interface. Because the XSS is stored, the malicious script persists in the database and executes whenever an affected page or interface element is loaded by users with access, potentially including administrators. The vulnerability requires no user interaction beyond loading the affected page and does not require higher privileges than author-level, which is a relatively low privilege tier in WordPress. The CVSS v3.1 base score is 6.4 (medium severity), reflecting network exploitability (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and a scope change (S:C) indicating that the vulnerability can affect resources beyond the initially vulnerable component. The impact includes partial confidentiality and integrity loss, as the injected scripts can steal sensitive information such as cookies or session tokens, manipulate page content, or perform actions on behalf of users with elevated privileges. There are no known exploits in the wild as of the published date (August 30, 2021), and no official patches linked in the provided data, though it is likely that the vendor has addressed this in subsequent releases. This vulnerability is particularly relevant for WordPress sites using the Real Media Library plugin, which is popular for organizing media files in a more user-friendly manner. Since the attack vector requires author-level access, it is critical to control user roles and permissions carefully to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites and intranet portals running WordPress with the Real Media Library plugin installed. Exploitation could lead to unauthorized script execution within the context of the affected site, enabling attackers to hijack user sessions, steal sensitive data, or perform unauthorized actions with the privileges of compromised users. This can result in data breaches, defacement, or further compromise of internal systems if administrative users are targeted. Given the widespread use of WordPress across European businesses, including SMEs and larger enterprises, the vulnerability could impact sectors such as e-commerce, media, education, and government agencies that rely on WordPress for content management. The stored nature of the XSS increases the risk as malicious payloads persist and affect multiple users. Additionally, the scope change in the CVSS vector indicates that the vulnerability could affect components beyond the plugin itself, potentially impacting other integrated systems or plugins. The lack of known exploits reduces immediate risk, but the ease of exploitation by any author-level user means insider threats or compromised accounts could leverage this vulnerability effectively.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Immediately audit WordPress installations to identify if the Real Media Library plugin is installed and determine the version in use. 2) Upgrade the plugin to the latest version where the vulnerability is patched; if no patch is available, consider disabling or uninstalling the plugin until a fix is released. 3) Restrict author-level privileges strictly to trusted users and review user roles to minimize the number of users with author or higher privileges. 4) Implement Web Application Firewall (WAF) rules that detect and block suspicious script injections in folder names or other input fields related to media management. 5) Conduct regular security training for content authors and administrators to recognize potential malicious activity and enforce strong authentication mechanisms such as MFA to reduce account compromise risk. 6) Monitor logs for unusual activity related to media library folder creation or modification. 7) Consider deploying Content Security Policy (CSP) headers to limit the impact of any injected scripts by restricting the sources from which scripts can be loaded. 8) Perform regular vulnerability scans and penetration tests focusing on WordPress plugins to detect similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc925
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 1:09:34 AM
Last updated: 8/7/2025, 3:57:41 PM
Views: 17
Related Threats
CVE-2025-6184: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeum Tutor LMS Pro
HighCVE-2025-8762: Improper Physical Access Control in INSTAR 2K+
HighCVE-2025-8761: Denial of Service in INSTAR 2K+
HighCVE-2025-8760: Buffer Overflow in INSTAR 2K+
CriticalCVE-2025-6715: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in LatePoint
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.