CVE-2021-38351: CWE-79 Cross-site Scripting (XSS) in OSD Subscribe OSD Subscribe
The OSD Subscribe WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the osd_subscribe_message parameter found in the ~/options/osd_subscribe_options_subscribers.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.3.
AI Analysis
Technical Summary
CVE-2021-38351 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the OSD Subscribe WordPress plugin, specifically affecting versions up to and including 1.2.3. The vulnerability arises from improper sanitization of the 'osd_subscribe_message' parameter within the file ~/options/osd_subscribe_options_subscribers.php. This flaw allows an attacker to inject arbitrary malicious scripts into web pages viewed by other users. Since it is a reflected XSS, the malicious payload is embedded in a crafted URL or request that, when visited or triggered by a user, executes the injected script in the victim's browser context. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be executed remotely over the network without privileges but requires user interaction (clicking a malicious link). The vulnerability impacts confidentiality and integrity by potentially allowing theft of session cookies, user credentials, or manipulation of displayed content, but does not affect availability. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, such as user sessions or other parts of the web application. No known public exploits have been reported in the wild, and no official patches are linked in the provided data, indicating that mitigation might rely on manual updates or plugin removal. This vulnerability is typical of CWE-79, a common web application security weakness related to insufficient input validation and output encoding, which can lead to client-side code execution and subsequent attacks such as session hijacking, phishing, or privilege escalation within the web application context.
Potential Impact
For European organizations using WordPress websites with the OSD Subscribe plugin (version 1.2.3 or earlier), this vulnerability poses a moderate risk. Attackers can craft malicious URLs that, when visited by site administrators or users, execute scripts that may steal sensitive session tokens or manipulate user interactions. This can lead to unauthorized access to user accounts, data leakage, or defacement of web content, undermining user trust and potentially violating GDPR requirements concerning data protection. Since the vulnerability requires user interaction, phishing campaigns targeting employees or customers could leverage this flaw to escalate attacks. The impact is particularly significant for organizations relying on OSD Subscribe for managing subscriptions or communications, as compromised user data or session hijacking could disrupt business operations or lead to reputational damage. However, the lack of known exploits in the wild and the medium CVSS score suggest that while the threat is real, it is not currently widespread or critical. Nonetheless, the vulnerability’s ability to affect confidentiality and integrity, combined with the potential for scope escalation, warrants timely remediation to prevent exploitation.
Mitigation Recommendations
1. Immediate removal or disabling of the OSD Subscribe plugin if it is not essential to business operations. 2. If the plugin is required, upgrade to a patched version once available from the vendor or apply manual code fixes to sanitize and properly encode the 'osd_subscribe_message' parameter to prevent script injection. 3. Implement Web Application Firewall (WAF) rules that detect and block suspicious payloads targeting the vulnerable parameter, focusing on common XSS attack patterns. 4. Conduct regular security audits and penetration testing on WordPress sites to identify similar injection points. 5. Educate users and administrators about the risks of clicking untrusted links, especially those that could trigger reflected XSS attacks. 6. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected web pages, mitigating the impact of any successful injection. 7. Monitor web server logs for unusual request patterns targeting the vulnerable parameter to detect attempted exploitation. 8. Ensure that all user input is validated and output is encoded consistently across the web application to prevent similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-38351: CWE-79 Cross-site Scripting (XSS) in OSD Subscribe OSD Subscribe
Description
The OSD Subscribe WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the osd_subscribe_message parameter found in the ~/options/osd_subscribe_options_subscribers.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.3.
AI-Powered Analysis
Technical Analysis
CVE-2021-38351 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the OSD Subscribe WordPress plugin, specifically affecting versions up to and including 1.2.3. The vulnerability arises from improper sanitization of the 'osd_subscribe_message' parameter within the file ~/options/osd_subscribe_options_subscribers.php. This flaw allows an attacker to inject arbitrary malicious scripts into web pages viewed by other users. Since it is a reflected XSS, the malicious payload is embedded in a crafted URL or request that, when visited or triggered by a user, executes the injected script in the victim's browser context. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be executed remotely over the network without privileges but requires user interaction (clicking a malicious link). The vulnerability impacts confidentiality and integrity by potentially allowing theft of session cookies, user credentials, or manipulation of displayed content, but does not affect availability. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, such as user sessions or other parts of the web application. No known public exploits have been reported in the wild, and no official patches are linked in the provided data, indicating that mitigation might rely on manual updates or plugin removal. This vulnerability is typical of CWE-79, a common web application security weakness related to insufficient input validation and output encoding, which can lead to client-side code execution and subsequent attacks such as session hijacking, phishing, or privilege escalation within the web application context.
Potential Impact
For European organizations using WordPress websites with the OSD Subscribe plugin (version 1.2.3 or earlier), this vulnerability poses a moderate risk. Attackers can craft malicious URLs that, when visited by site administrators or users, execute scripts that may steal sensitive session tokens or manipulate user interactions. This can lead to unauthorized access to user accounts, data leakage, or defacement of web content, undermining user trust and potentially violating GDPR requirements concerning data protection. Since the vulnerability requires user interaction, phishing campaigns targeting employees or customers could leverage this flaw to escalate attacks. The impact is particularly significant for organizations relying on OSD Subscribe for managing subscriptions or communications, as compromised user data or session hijacking could disrupt business operations or lead to reputational damage. However, the lack of known exploits in the wild and the medium CVSS score suggest that while the threat is real, it is not currently widespread or critical. Nonetheless, the vulnerability’s ability to affect confidentiality and integrity, combined with the potential for scope escalation, warrants timely remediation to prevent exploitation.
Mitigation Recommendations
1. Immediate removal or disabling of the OSD Subscribe plugin if it is not essential to business operations. 2. If the plugin is required, upgrade to a patched version once available from the vendor or apply manual code fixes to sanitize and properly encode the 'osd_subscribe_message' parameter to prevent script injection. 3. Implement Web Application Firewall (WAF) rules that detect and block suspicious payloads targeting the vulnerable parameter, focusing on common XSS attack patterns. 4. Conduct regular security audits and penetration testing on WordPress sites to identify similar injection points. 5. Educate users and administrators about the risks of clicking untrusted links, especially those that could trigger reflected XSS attacks. 6. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected web pages, mitigating the impact of any successful injection. 7. Monitor web server logs for unusual request patterns targeting the vulnerable parameter to detect attempted exploitation. 8. Ensure that all user input is validated and output is encoded consistently across the web application to prevent similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-08-09T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbeb96f
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 3:57:58 AM
Last updated: 8/7/2025, 10:16:40 AM
Views: 17
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.