CVE-2021-38347: CWE-79 Cross-site Scripting (XSS) in Custom Website Data Custom Website Data
The Custom Website Data WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter found in the ~/views/edit.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.2.
AI Analysis
Technical Summary
CVE-2021-38347 is a reflected Cross-Site Scripting (XSS) vulnerability affecting the Custom Website Data WordPress plugin, specifically versions up to and including 2.2. The vulnerability exists in the ~/views/edit.php file where the 'id' parameter is not properly sanitized or validated, allowing an attacker to inject arbitrary malicious scripts. When a victim user accesses a crafted URL containing the malicious payload in the 'id' parameter, the injected script executes in the context of the victim's browser. This can lead to theft of session cookies, defacement, or redirection to malicious sites. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 6.1 (medium severity), with an attack vector of network (remote), low attack complexity, no privileges required, but user interaction is necessary (the victim must click a malicious link). The scope is changed, meaning the vulnerability can affect resources beyond the vulnerable component, potentially impacting the confidentiality and integrity of user data. There are no known public exploits in the wild, and no official patches or updates have been linked in the provided data. The plugin is used within WordPress environments, which are widely deployed across many European organizations for website content management and customer engagement.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of web session data and user interactions on affected websites. Exploitation could allow attackers to hijack user sessions, steal sensitive information, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or data leakage. This is particularly concerning for organizations handling personal data under GDPR regulations, as exploitation could result in data breaches with legal and reputational consequences. Additionally, compromised websites could be used to distribute malware or conduct phishing campaigns targeting European users. The reflected nature of the XSS means attacks require user interaction, typically via social engineering, but the widespread use of WordPress and the plugin increases the attack surface. The vulnerability does not directly impact availability but can undermine trust in affected web services and lead to indirect operational disruptions.
Mitigation Recommendations
1. Immediate mitigation involves disabling or removing the Custom Website Data plugin version 2.2 or earlier until a patched version is available. 2. Implement Web Application Firewall (WAF) rules specifically targeting suspicious input patterns in the 'id' parameter to block malicious payloads. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected websites, mitigating the impact of XSS attacks. 4. Conduct thorough input validation and sanitization on all user-supplied parameters, especially 'id', to prevent script injection. 5. Educate website administrators and users about the risks of clicking on untrusted links to reduce the likelihood of successful social engineering exploitation. 6. Monitor web server logs for unusual requests containing suspicious script patterns in URL parameters. 7. Keep WordPress core, themes, and plugins updated regularly and subscribe to vendor security advisories for timely patching. 8. Consider deploying security plugins that provide XSS protection and scanning capabilities to detect vulnerable components.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2021-38347: CWE-79 Cross-site Scripting (XSS) in Custom Website Data Custom Website Data
Description
The Custom Website Data WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter found in the ~/views/edit.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.2.
AI-Powered Analysis
Technical Analysis
CVE-2021-38347 is a reflected Cross-Site Scripting (XSS) vulnerability affecting the Custom Website Data WordPress plugin, specifically versions up to and including 2.2. The vulnerability exists in the ~/views/edit.php file where the 'id' parameter is not properly sanitized or validated, allowing an attacker to inject arbitrary malicious scripts. When a victim user accesses a crafted URL containing the malicious payload in the 'id' parameter, the injected script executes in the context of the victim's browser. This can lead to theft of session cookies, defacement, or redirection to malicious sites. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 6.1 (medium severity), with an attack vector of network (remote), low attack complexity, no privileges required, but user interaction is necessary (the victim must click a malicious link). The scope is changed, meaning the vulnerability can affect resources beyond the vulnerable component, potentially impacting the confidentiality and integrity of user data. There are no known public exploits in the wild, and no official patches or updates have been linked in the provided data. The plugin is used within WordPress environments, which are widely deployed across many European organizations for website content management and customer engagement.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of web session data and user interactions on affected websites. Exploitation could allow attackers to hijack user sessions, steal sensitive information, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or data leakage. This is particularly concerning for organizations handling personal data under GDPR regulations, as exploitation could result in data breaches with legal and reputational consequences. Additionally, compromised websites could be used to distribute malware or conduct phishing campaigns targeting European users. The reflected nature of the XSS means attacks require user interaction, typically via social engineering, but the widespread use of WordPress and the plugin increases the attack surface. The vulnerability does not directly impact availability but can undermine trust in affected web services and lead to indirect operational disruptions.
Mitigation Recommendations
1. Immediate mitigation involves disabling or removing the Custom Website Data plugin version 2.2 or earlier until a patched version is available. 2. Implement Web Application Firewall (WAF) rules specifically targeting suspicious input patterns in the 'id' parameter to block malicious payloads. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected websites, mitigating the impact of XSS attacks. 4. Conduct thorough input validation and sanitization on all user-supplied parameters, especially 'id', to prevent script injection. 5. Educate website administrators and users about the risks of clicking on untrusted links to reduce the likelihood of successful social engineering exploitation. 6. Monitor web server logs for unusual requests containing suspicious script patterns in URL parameters. 7. Keep WordPress core, themes, and plugins updated regularly and subscribe to vendor security advisories for timely patching. 8. Consider deploying security plugins that provide XSS protection and scanning capabilities to detect vulnerable components.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-08-09T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbeb9f9
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 3:28:39 AM
Last updated: 8/9/2025, 2:44:52 AM
Views: 16
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.