Skip to main content

CVE-2021-38347: CWE-79 Cross-site Scripting (XSS) in Custom Website Data Custom Website Data

Medium
VulnerabilityCVE-2021-38347cvecve-2021-38347cwe-79
Published: Fri Sep 10 2021 (09/10/2021, 13:34:24 UTC)
Source: CVE
Vendor/Project: Custom Website Data
Product: Custom Website Data

Description

The Custom Website Data WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter found in the ~/views/edit.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.2.

AI-Powered Analysis

AILast updated: 06/26/2025, 03:28:39 UTC

Technical Analysis

CVE-2021-38347 is a reflected Cross-Site Scripting (XSS) vulnerability affecting the Custom Website Data WordPress plugin, specifically versions up to and including 2.2. The vulnerability exists in the ~/views/edit.php file where the 'id' parameter is not properly sanitized or validated, allowing an attacker to inject arbitrary malicious scripts. When a victim user accesses a crafted URL containing the malicious payload in the 'id' parameter, the injected script executes in the context of the victim's browser. This can lead to theft of session cookies, defacement, or redirection to malicious sites. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 6.1 (medium severity), with an attack vector of network (remote), low attack complexity, no privileges required, but user interaction is necessary (the victim must click a malicious link). The scope is changed, meaning the vulnerability can affect resources beyond the vulnerable component, potentially impacting the confidentiality and integrity of user data. There are no known public exploits in the wild, and no official patches or updates have been linked in the provided data. The plugin is used within WordPress environments, which are widely deployed across many European organizations for website content management and customer engagement.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of web session data and user interactions on affected websites. Exploitation could allow attackers to hijack user sessions, steal sensitive information, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or data leakage. This is particularly concerning for organizations handling personal data under GDPR regulations, as exploitation could result in data breaches with legal and reputational consequences. Additionally, compromised websites could be used to distribute malware or conduct phishing campaigns targeting European users. The reflected nature of the XSS means attacks require user interaction, typically via social engineering, but the widespread use of WordPress and the plugin increases the attack surface. The vulnerability does not directly impact availability but can undermine trust in affected web services and lead to indirect operational disruptions.

Mitigation Recommendations

1. Immediate mitigation involves disabling or removing the Custom Website Data plugin version 2.2 or earlier until a patched version is available. 2. Implement Web Application Firewall (WAF) rules specifically targeting suspicious input patterns in the 'id' parameter to block malicious payloads. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected websites, mitigating the impact of XSS attacks. 4. Conduct thorough input validation and sanitization on all user-supplied parameters, especially 'id', to prevent script injection. 5. Educate website administrators and users about the risks of clicking on untrusted links to reduce the likelihood of successful social engineering exploitation. 6. Monitor web server logs for unusual requests containing suspicious script patterns in URL parameters. 7. Keep WordPress core, themes, and plugins updated regularly and subscribe to vendor security advisories for timely patching. 8. Consider deploying security plugins that provide XSS protection and scanning capabilities to detect vulnerable components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb9f9

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 3:28:39 AM

Last updated: 8/9/2025, 2:44:52 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats