Skip to main content

CVE-2021-38321: CWE-79 Cross-site Scripting (XSS) in Custom Menu Plugin Custom Menu Plugin

Medium
VulnerabilityCVE-2021-38321cvecve-2021-38321cwe-79
Published: Thu Sep 09 2021 (09/09/2021, 18:10:10 UTC)
Source: CVE
Vendor/Project: Custom Menu Plugin
Product: Custom Menu Plugin

Description

The Custom Menu Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the selected_menu parameter found in the ~/custom-menus.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.3.

AI-Powered Analysis

AILast updated: 07/06/2025, 22:41:28 UTC

Technical Analysis

CVE-2021-38321 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Custom Menu Plugin for WordPress, specifically affecting versions up to and including 1.3.3. The vulnerability arises from improper sanitization of the 'selected_menu' parameter in the custom-menus.php file. An attacker can craft a malicious URL containing a script payload within this parameter, which, when visited by a user, causes the injected script to execute in the context of the victim's browser. This type of XSS is classified as reflected because the malicious script is not stored on the server but reflected off the web application in the HTTP response. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The attack vector is network-based (remote), requires no privileges (PR:N), but does require user interaction (UI:R) such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent (C:L/I:L), but does not affect availability (A:N). No known exploits in the wild have been reported, and no official patches are linked in the provided data. The vulnerability is categorized under CWE-79, which is a common and well-understood web security issue related to improper input validation and output encoding in web applications. Since WordPress is a widely used content management system, and plugins like Custom Menu Plugin are commonly used to enhance site navigation, this vulnerability could be leveraged to steal session cookies, perform phishing attacks, or execute arbitrary scripts in the context of authenticated users or visitors, potentially leading to account compromise or data leakage.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress websites that utilize the Custom Menu Plugin version 1.3.3 or earlier. Exploitation could lead to unauthorized disclosure of sensitive information such as session tokens or personal data, violating GDPR requirements on data protection and privacy. The reflected XSS could also be used to conduct targeted phishing campaigns against employees or customers by injecting malicious scripts that mimic legitimate site content, thereby undermining trust and potentially causing reputational damage. Although the vulnerability does not directly affect system availability, the integrity and confidentiality risks could lead to further compromise, including unauthorized access to backend systems if session hijacking occurs. Additionally, organizations in sectors such as finance, healthcare, and government, which often have strict compliance and security requirements, may face regulatory penalties if such vulnerabilities are exploited and not remediated promptly. The need for user interaction means that social engineering or phishing tactics would likely be employed, increasing the risk to users who are less security-aware. Overall, the vulnerability poses a moderate risk but should be addressed proactively to maintain security posture and compliance within European contexts.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should first identify all WordPress installations using the Custom Menu Plugin version 1.3.3 or earlier. Since no official patch links are provided, organizations should check the plugin developer’s official repository or WordPress plugin directory for updates or security patches addressing CVE-2021-38321. If an updated version is available, immediate upgrade is recommended. In the absence of an official patch, organizations can implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'selected_menu' parameter, focusing on common XSS attack patterns such as script tags or event handlers. Additionally, input validation and output encoding should be enforced at the application level; developers maintaining custom forks or versions of the plugin should sanitize and encode user-supplied input rigorously. Security awareness training for users is also critical to reduce the risk of successful phishing or social engineering attacks exploiting this vulnerability. Regular vulnerability scanning and penetration testing should include checks for reflected XSS vulnerabilities. Finally, monitoring web server logs for suspicious requests containing script injections in the 'selected_menu' parameter can help detect attempted exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbbf6

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 10:41:28 PM

Last updated: 8/17/2025, 5:13:28 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats