CVE-2021-38321: CWE-79 Cross-site Scripting (XSS) in Custom Menu Plugin Custom Menu Plugin
The Custom Menu Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the selected_menu parameter found in the ~/custom-menus.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.3.
AI Analysis
Technical Summary
CVE-2021-38321 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Custom Menu Plugin for WordPress, specifically affecting versions up to and including 1.3.3. The vulnerability arises from improper sanitization of the 'selected_menu' parameter in the custom-menus.php file. An attacker can craft a malicious URL containing a script payload within this parameter, which, when visited by a user, causes the injected script to execute in the context of the victim's browser. This type of XSS is classified as reflected because the malicious script is not stored on the server but reflected off the web application in the HTTP response. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The attack vector is network-based (remote), requires no privileges (PR:N), but does require user interaction (UI:R) such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent (C:L/I:L), but does not affect availability (A:N). No known exploits in the wild have been reported, and no official patches are linked in the provided data. The vulnerability is categorized under CWE-79, which is a common and well-understood web security issue related to improper input validation and output encoding in web applications. Since WordPress is a widely used content management system, and plugins like Custom Menu Plugin are commonly used to enhance site navigation, this vulnerability could be leveraged to steal session cookies, perform phishing attacks, or execute arbitrary scripts in the context of authenticated users or visitors, potentially leading to account compromise or data leakage.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress websites that utilize the Custom Menu Plugin version 1.3.3 or earlier. Exploitation could lead to unauthorized disclosure of sensitive information such as session tokens or personal data, violating GDPR requirements on data protection and privacy. The reflected XSS could also be used to conduct targeted phishing campaigns against employees or customers by injecting malicious scripts that mimic legitimate site content, thereby undermining trust and potentially causing reputational damage. Although the vulnerability does not directly affect system availability, the integrity and confidentiality risks could lead to further compromise, including unauthorized access to backend systems if session hijacking occurs. Additionally, organizations in sectors such as finance, healthcare, and government, which often have strict compliance and security requirements, may face regulatory penalties if such vulnerabilities are exploited and not remediated promptly. The need for user interaction means that social engineering or phishing tactics would likely be employed, increasing the risk to users who are less security-aware. Overall, the vulnerability poses a moderate risk but should be addressed proactively to maintain security posture and compliance within European contexts.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should first identify all WordPress installations using the Custom Menu Plugin version 1.3.3 or earlier. Since no official patch links are provided, organizations should check the plugin developer’s official repository or WordPress plugin directory for updates or security patches addressing CVE-2021-38321. If an updated version is available, immediate upgrade is recommended. In the absence of an official patch, organizations can implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'selected_menu' parameter, focusing on common XSS attack patterns such as script tags or event handlers. Additionally, input validation and output encoding should be enforced at the application level; developers maintaining custom forks or versions of the plugin should sanitize and encode user-supplied input rigorously. Security awareness training for users is also critical to reduce the risk of successful phishing or social engineering attacks exploiting this vulnerability. Regular vulnerability scanning and penetration testing should include checks for reflected XSS vulnerabilities. Finally, monitoring web server logs for suspicious requests containing script injections in the 'selected_menu' parameter can help detect attempted exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-38321: CWE-79 Cross-site Scripting (XSS) in Custom Menu Plugin Custom Menu Plugin
Description
The Custom Menu Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the selected_menu parameter found in the ~/custom-menus.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.3.
AI-Powered Analysis
Technical Analysis
CVE-2021-38321 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Custom Menu Plugin for WordPress, specifically affecting versions up to and including 1.3.3. The vulnerability arises from improper sanitization of the 'selected_menu' parameter in the custom-menus.php file. An attacker can craft a malicious URL containing a script payload within this parameter, which, when visited by a user, causes the injected script to execute in the context of the victim's browser. This type of XSS is classified as reflected because the malicious script is not stored on the server but reflected off the web application in the HTTP response. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The attack vector is network-based (remote), requires no privileges (PR:N), but does require user interaction (UI:R) such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent (C:L/I:L), but does not affect availability (A:N). No known exploits in the wild have been reported, and no official patches are linked in the provided data. The vulnerability is categorized under CWE-79, which is a common and well-understood web security issue related to improper input validation and output encoding in web applications. Since WordPress is a widely used content management system, and plugins like Custom Menu Plugin are commonly used to enhance site navigation, this vulnerability could be leveraged to steal session cookies, perform phishing attacks, or execute arbitrary scripts in the context of authenticated users or visitors, potentially leading to account compromise or data leakage.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress websites that utilize the Custom Menu Plugin version 1.3.3 or earlier. Exploitation could lead to unauthorized disclosure of sensitive information such as session tokens or personal data, violating GDPR requirements on data protection and privacy. The reflected XSS could also be used to conduct targeted phishing campaigns against employees or customers by injecting malicious scripts that mimic legitimate site content, thereby undermining trust and potentially causing reputational damage. Although the vulnerability does not directly affect system availability, the integrity and confidentiality risks could lead to further compromise, including unauthorized access to backend systems if session hijacking occurs. Additionally, organizations in sectors such as finance, healthcare, and government, which often have strict compliance and security requirements, may face regulatory penalties if such vulnerabilities are exploited and not remediated promptly. The need for user interaction means that social engineering or phishing tactics would likely be employed, increasing the risk to users who are less security-aware. Overall, the vulnerability poses a moderate risk but should be addressed proactively to maintain security posture and compliance within European contexts.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should first identify all WordPress installations using the Custom Menu Plugin version 1.3.3 or earlier. Since no official patch links are provided, organizations should check the plugin developer’s official repository or WordPress plugin directory for updates or security patches addressing CVE-2021-38321. If an updated version is available, immediate upgrade is recommended. In the absence of an official patch, organizations can implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'selected_menu' parameter, focusing on common XSS attack patterns such as script tags or event handlers. Additionally, input validation and output encoding should be enforced at the application level; developers maintaining custom forks or versions of the plugin should sanitize and encode user-supplied input rigorously. Security awareness training for users is also critical to reduce the risk of successful phishing or social engineering attacks exploiting this vulnerability. Regular vulnerability scanning and penetration testing should include checks for reflected XSS vulnerabilities. Finally, monitoring web server logs for suspicious requests containing script injections in the 'selected_menu' parameter can help detect attempted exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-08-09T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbbf6
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 10:41:28 PM
Last updated: 8/17/2025, 5:13:28 AM
Views: 13
Related Threats
CVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumCVE-2025-9101: Cross Site Scripting in zhenfeng13 My-Blog
MediumCVE-2025-9100: Authentication Bypass by Capture-replay in zhenfeng13 My-Blog
MediumCVE-2025-9099: Unrestricted Upload in Acrel Environmental Monitoring Cloud Platform
MediumCVE-2025-9098: Improper Export of Android Application Components in Elseplus File Recovery App
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.