Skip to main content

CVE-2021-38350: CWE-79 Cross-site Scripting (XSS) in spideranalyse spideranalyse

Medium
VulnerabilityCVE-2021-38350cvecve-2021-38350cwe-79
Published: Fri Sep 10 2021 (09/10/2021, 13:32:10 UTC)
Source: CVE
Vendor/Project: spideranalyse
Product: spideranalyse

Description

The spideranalyse WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the date parameter found in the ~/analyse/index.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.1.

AI-Powered Analysis

AILast updated: 06/26/2025, 03:58:14 UTC

Technical Analysis

CVE-2021-38350 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the spideranalyse WordPress plugin, specifically affecting version 0.0.1 and earlier. The vulnerability exists in the ~/analyse/index.php file, where the 'date' parameter is improperly sanitized, allowing an attacker to inject arbitrary JavaScript code. When a victim user accesses a crafted URL containing malicious script code in the 'date' parameter, the injected script executes in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input leading to XSS. The CVSS 3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No known exploits have been reported in the wild, and no official patches or updates have been published by the vendor as of the data provided. The vulnerability is exploitable remotely without authentication but requires a user to click on a malicious link or visit a crafted page, which triggers the reflected XSS payload. The scope change indicates that the vulnerability affects components beyond the initially vulnerable component, potentially impacting the entire web application session or user data confidentiality and integrity.

Potential Impact

For European organizations using the spideranalyse WordPress plugin version 0.0.1, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of user sessions and data. Attackers could exploit this flaw to execute malicious scripts in the browsers of site visitors or administrators, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the user. This can undermine trust in the affected websites, cause reputational damage, and potentially lead to data breaches. Given that spideranalyse is a niche analytics plugin, the direct impact may be limited to organizations relying on this specific tool for web analytics. However, if used on websites handling sensitive or regulated data (e.g., personal data under GDPR), exploitation could result in compliance violations and associated penalties. The requirement for user interaction (clicking a malicious link) somewhat limits the attack vector but does not eliminate risk, especially in environments where phishing or social engineering attacks are common. The reflected nature of the XSS means that attacks are transient and require active user engagement, but the potential for targeted attacks against administrators or users remains significant.

Mitigation Recommendations

1. Immediate mitigation involves disabling or removing the spideranalyse plugin version 0.0.1 from WordPress installations until a patched version is available. 2. Implement Web Application Firewall (WAF) rules that detect and block suspicious input patterns in the 'date' parameter, especially scripts or HTML tags. 3. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 4. Educate users and administrators about the risks of clicking on unsolicited or suspicious links, particularly those containing URL parameters. 5. Regularly audit WordPress plugins for updates and vulnerabilities, and subscribe to vendor or security mailing lists for timely patch information. 6. If removal is not immediately feasible, consider sanitizing inputs at the web server or application level using custom code or security plugins that filter or encode URL parameters. 7. Monitor web server logs for unusual requests containing suspicious 'date' parameter values indicative of attempted exploitation. 8. Conduct penetration testing focusing on XSS vectors to identify similar vulnerabilities in other plugins or custom code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb96b

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 3:58:14 AM

Last updated: 8/6/2025, 4:50:44 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats