Skip to main content

CVE-2021-38351: CWE-79 Cross-site Scripting (XSS) in OSD Subscribe OSD Subscribe

Low
VulnerabilityCVE-2021-38351cvecve-2021-38351cwe-79
Published: Fri Sep 10 2021 (09/10/2021, 13:32:04 UTC)
Source: CVE
Vendor/Project: OSD Subscribe
Product: OSD Subscribe

Description

The OSD Subscribe WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the osd_subscribe_message parameter found in the ~/options/osd_subscribe_options_subscribers.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.3.

AI-Powered Analysis

AILast updated: 06/26/2025, 03:57:58 UTC

Technical Analysis

CVE-2021-38351 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the OSD Subscribe WordPress plugin, specifically affecting versions up to and including 1.2.3. The vulnerability arises from improper sanitization of the 'osd_subscribe_message' parameter within the file ~/options/osd_subscribe_options_subscribers.php. This flaw allows an attacker to inject arbitrary malicious scripts into web pages viewed by other users. Since it is a reflected XSS, the malicious payload is embedded in a crafted URL or request that, when visited or triggered by a user, executes the injected script in the victim's browser context. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be executed remotely over the network without privileges but requires user interaction (clicking a malicious link). The vulnerability impacts confidentiality and integrity by potentially allowing theft of session cookies, user credentials, or manipulation of displayed content, but does not affect availability. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, such as user sessions or other parts of the web application. No known public exploits have been reported in the wild, and no official patches are linked in the provided data, indicating that mitigation might rely on manual updates or plugin removal. This vulnerability is typical of CWE-79, a common web application security weakness related to insufficient input validation and output encoding, which can lead to client-side code execution and subsequent attacks such as session hijacking, phishing, or privilege escalation within the web application context.

Potential Impact

For European organizations using WordPress websites with the OSD Subscribe plugin (version 1.2.3 or earlier), this vulnerability poses a moderate risk. Attackers can craft malicious URLs that, when visited by site administrators or users, execute scripts that may steal sensitive session tokens or manipulate user interactions. This can lead to unauthorized access to user accounts, data leakage, or defacement of web content, undermining user trust and potentially violating GDPR requirements concerning data protection. Since the vulnerability requires user interaction, phishing campaigns targeting employees or customers could leverage this flaw to escalate attacks. The impact is particularly significant for organizations relying on OSD Subscribe for managing subscriptions or communications, as compromised user data or session hijacking could disrupt business operations or lead to reputational damage. However, the lack of known exploits in the wild and the medium CVSS score suggest that while the threat is real, it is not currently widespread or critical. Nonetheless, the vulnerability’s ability to affect confidentiality and integrity, combined with the potential for scope escalation, warrants timely remediation to prevent exploitation.

Mitigation Recommendations

1. Immediate removal or disabling of the OSD Subscribe plugin if it is not essential to business operations. 2. If the plugin is required, upgrade to a patched version once available from the vendor or apply manual code fixes to sanitize and properly encode the 'osd_subscribe_message' parameter to prevent script injection. 3. Implement Web Application Firewall (WAF) rules that detect and block suspicious payloads targeting the vulnerable parameter, focusing on common XSS attack patterns. 4. Conduct regular security audits and penetration testing on WordPress sites to identify similar injection points. 5. Educate users and administrators about the risks of clicking untrusted links, especially those that could trigger reflected XSS attacks. 6. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected web pages, mitigating the impact of any successful injection. 7. Monitor web server logs for unusual request patterns targeting the vulnerable parameter to detect attempted exploitation. 8. Ensure that all user input is validated and output is encoded consistently across the web application to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb96f

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 3:57:58 AM

Last updated: 8/7/2025, 10:16:40 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats