CVE-2021-38321: CWE-79 Cross-site Scripting (XSS) in Custom Menu Plugin Custom Menu Plugin
The Custom Menu Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the selected_menu parameter found in the ~/custom-menus.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.3.
AI Analysis
Technical Summary
CVE-2021-38321 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Custom Menu Plugin for WordPress, specifically affecting versions up to and including 1.3.3. The vulnerability arises from improper sanitization of the 'selected_menu' parameter in the custom-menus.php file. An attacker can craft a malicious URL containing a script payload within this parameter, which, when visited by a user, causes the injected script to execute in the context of the victim's browser. This type of XSS is classified as reflected because the malicious script is not stored on the server but reflected off the web application in the HTTP response. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The attack vector is network-based (remote), requires no privileges (PR:N), but does require user interaction (UI:R) such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent (C:L/I:L), but does not affect availability (A:N). No known exploits in the wild have been reported, and no official patches are linked in the provided data. The vulnerability is categorized under CWE-79, which is a common and well-understood web security issue related to improper input validation and output encoding in web applications. Since WordPress is a widely used content management system, and plugins like Custom Menu Plugin are commonly used to enhance site navigation, this vulnerability could be leveraged to steal session cookies, perform phishing attacks, or execute arbitrary scripts in the context of authenticated users or visitors, potentially leading to account compromise or data leakage.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress websites that utilize the Custom Menu Plugin version 1.3.3 or earlier. Exploitation could lead to unauthorized disclosure of sensitive information such as session tokens or personal data, violating GDPR requirements on data protection and privacy. The reflected XSS could also be used to conduct targeted phishing campaigns against employees or customers by injecting malicious scripts that mimic legitimate site content, thereby undermining trust and potentially causing reputational damage. Although the vulnerability does not directly affect system availability, the integrity and confidentiality risks could lead to further compromise, including unauthorized access to backend systems if session hijacking occurs. Additionally, organizations in sectors such as finance, healthcare, and government, which often have strict compliance and security requirements, may face regulatory penalties if such vulnerabilities are exploited and not remediated promptly. The need for user interaction means that social engineering or phishing tactics would likely be employed, increasing the risk to users who are less security-aware. Overall, the vulnerability poses a moderate risk but should be addressed proactively to maintain security posture and compliance within European contexts.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should first identify all WordPress installations using the Custom Menu Plugin version 1.3.3 or earlier. Since no official patch links are provided, organizations should check the plugin developer’s official repository or WordPress plugin directory for updates or security patches addressing CVE-2021-38321. If an updated version is available, immediate upgrade is recommended. In the absence of an official patch, organizations can implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'selected_menu' parameter, focusing on common XSS attack patterns such as script tags or event handlers. Additionally, input validation and output encoding should be enforced at the application level; developers maintaining custom forks or versions of the plugin should sanitize and encode user-supplied input rigorously. Security awareness training for users is also critical to reduce the risk of successful phishing or social engineering attacks exploiting this vulnerability. Regular vulnerability scanning and penetration testing should include checks for reflected XSS vulnerabilities. Finally, monitoring web server logs for suspicious requests containing script injections in the 'selected_menu' parameter can help detect attempted exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-38321: CWE-79 Cross-site Scripting (XSS) in Custom Menu Plugin Custom Menu Plugin
Description
The Custom Menu Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the selected_menu parameter found in the ~/custom-menus.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.3.
AI-Powered Analysis
Technical Analysis
CVE-2021-38321 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Custom Menu Plugin for WordPress, specifically affecting versions up to and including 1.3.3. The vulnerability arises from improper sanitization of the 'selected_menu' parameter in the custom-menus.php file. An attacker can craft a malicious URL containing a script payload within this parameter, which, when visited by a user, causes the injected script to execute in the context of the victim's browser. This type of XSS is classified as reflected because the malicious script is not stored on the server but reflected off the web application in the HTTP response. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The attack vector is network-based (remote), requires no privileges (PR:N), but does require user interaction (UI:R) such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent (C:L/I:L), but does not affect availability (A:N). No known exploits in the wild have been reported, and no official patches are linked in the provided data. The vulnerability is categorized under CWE-79, which is a common and well-understood web security issue related to improper input validation and output encoding in web applications. Since WordPress is a widely used content management system, and plugins like Custom Menu Plugin are commonly used to enhance site navigation, this vulnerability could be leveraged to steal session cookies, perform phishing attacks, or execute arbitrary scripts in the context of authenticated users or visitors, potentially leading to account compromise or data leakage.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress websites that utilize the Custom Menu Plugin version 1.3.3 or earlier. Exploitation could lead to unauthorized disclosure of sensitive information such as session tokens or personal data, violating GDPR requirements on data protection and privacy. The reflected XSS could also be used to conduct targeted phishing campaigns against employees or customers by injecting malicious scripts that mimic legitimate site content, thereby undermining trust and potentially causing reputational damage. Although the vulnerability does not directly affect system availability, the integrity and confidentiality risks could lead to further compromise, including unauthorized access to backend systems if session hijacking occurs. Additionally, organizations in sectors such as finance, healthcare, and government, which often have strict compliance and security requirements, may face regulatory penalties if such vulnerabilities are exploited and not remediated promptly. The need for user interaction means that social engineering or phishing tactics would likely be employed, increasing the risk to users who are less security-aware. Overall, the vulnerability poses a moderate risk but should be addressed proactively to maintain security posture and compliance within European contexts.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should first identify all WordPress installations using the Custom Menu Plugin version 1.3.3 or earlier. Since no official patch links are provided, organizations should check the plugin developer’s official repository or WordPress plugin directory for updates or security patches addressing CVE-2021-38321. If an updated version is available, immediate upgrade is recommended. In the absence of an official patch, organizations can implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'selected_menu' parameter, focusing on common XSS attack patterns such as script tags or event handlers. Additionally, input validation and output encoding should be enforced at the application level; developers maintaining custom forks or versions of the plugin should sanitize and encode user-supplied input rigorously. Security awareness training for users is also critical to reduce the risk of successful phishing or social engineering attacks exploiting this vulnerability. Regular vulnerability scanning and penetration testing should include checks for reflected XSS vulnerabilities. Finally, monitoring web server logs for suspicious requests containing script injections in the 'selected_menu' parameter can help detect attempted exploitation attempts early.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-08-09T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbbf6
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 10:41:28 PM
Last updated: 2/4/2026, 8:05:34 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-37301: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in adfinis document-merge-service
HighCVE-2026-25161: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in AlistGo alist
HighCVE-2026-25160: CWE-295: Improper Certificate Validation in AlistGo alist
CriticalCVE-2026-25145: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in chainguard-dev melange
MediumCVE-2026-25143: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in chainguard-dev melange
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.