Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-38347: CWE-79 Cross-site Scripting (XSS) in Custom Website Data Custom Website Data

0
Medium
VulnerabilityCVE-2021-38347cvecve-2021-38347cwe-79
Published: Fri Sep 10 2021 (09/10/2021, 13:34:24 UTC)
Source: CVE
Vendor/Project: Custom Website Data
Product: Custom Website Data

Description

The Custom Website Data WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter found in the ~/views/edit.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.2.

AI-Powered Analysis

AILast updated: 06/26/2025, 03:28:39 UTC

Technical Analysis

CVE-2021-38347 is a reflected Cross-Site Scripting (XSS) vulnerability affecting the Custom Website Data WordPress plugin, specifically versions up to and including 2.2. The vulnerability exists in the ~/views/edit.php file where the 'id' parameter is not properly sanitized or validated, allowing an attacker to inject arbitrary malicious scripts. When a victim user accesses a crafted URL containing the malicious payload in the 'id' parameter, the injected script executes in the context of the victim's browser. This can lead to theft of session cookies, defacement, or redirection to malicious sites. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 6.1 (medium severity), with an attack vector of network (remote), low attack complexity, no privileges required, but user interaction is necessary (the victim must click a malicious link). The scope is changed, meaning the vulnerability can affect resources beyond the vulnerable component, potentially impacting the confidentiality and integrity of user data. There are no known public exploits in the wild, and no official patches or updates have been linked in the provided data. The plugin is used within WordPress environments, which are widely deployed across many European organizations for website content management and customer engagement.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of web session data and user interactions on affected websites. Exploitation could allow attackers to hijack user sessions, steal sensitive information, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or data leakage. This is particularly concerning for organizations handling personal data under GDPR regulations, as exploitation could result in data breaches with legal and reputational consequences. Additionally, compromised websites could be used to distribute malware or conduct phishing campaigns targeting European users. The reflected nature of the XSS means attacks require user interaction, typically via social engineering, but the widespread use of WordPress and the plugin increases the attack surface. The vulnerability does not directly impact availability but can undermine trust in affected web services and lead to indirect operational disruptions.

Mitigation Recommendations

1. Immediate mitigation involves disabling or removing the Custom Website Data plugin version 2.2 or earlier until a patched version is available. 2. Implement Web Application Firewall (WAF) rules specifically targeting suspicious input patterns in the 'id' parameter to block malicious payloads. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected websites, mitigating the impact of XSS attacks. 4. Conduct thorough input validation and sanitization on all user-supplied parameters, especially 'id', to prevent script injection. 5. Educate website administrators and users about the risks of clicking on untrusted links to reduce the likelihood of successful social engineering exploitation. 6. Monitor web server logs for unusual requests containing suspicious script patterns in URL parameters. 7. Keep WordPress core, themes, and plugins updated regularly and subscribe to vendor security advisories for timely patching. 8. Consider deploying security plugins that provide XSS protection and scanning capabilities to detect vulnerable components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb9f9

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 3:28:39 AM

Last updated: 2/4/2026, 11:48:26 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats