CVE-2021-38352: CWE-79 Cross-site Scripting (XSS) in Feedify – Web Push Notifications Feedify – Web Push Notifications
The Feedify – Web Push Notifications WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the feedify_msg parameter found in the ~/includes/base.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.1.8.
AI Analysis
Technical Summary
CVE-2021-38352 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Feedify – Web Push Notifications WordPress plugin, specifically affecting versions up to and including 2.1.8. The vulnerability arises from improper sanitization of the 'feedify_msg' parameter in the ~/includes/base.php file. An attacker can craft a malicious URL containing a payload in this parameter, which when visited by a user, causes the injected script to be executed in the context of the victim's browser. This reflected XSS does not require authentication but does require user interaction, such as clicking a malicious link. The vulnerability impacts confidentiality and integrity by potentially allowing attackers to steal session cookies, perform actions on behalf of the user, or manipulate the content displayed to the user. The CVSS 3.1 base score is 6.1 (medium severity), with an attack vector of network (remote), low attack complexity, no privileges required, user interaction required, and scope changed due to impact beyond the vulnerable component. No known exploits in the wild have been reported to date. The plugin is widely used for web push notifications in WordPress sites, which are common across various industries. The vulnerability is typical of CWE-79, where insufficient input validation leads to script injection and execution in the victim's browser environment.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the vulnerable Feedify plugin for push notifications. Successful exploitation could lead to session hijacking, defacement, or redirection to malicious sites, impacting user trust and potentially leading to data leakage or unauthorized actions on affected websites. Organizations in sectors with high web presence such as e-commerce, media, and public services could see reputational damage and user data compromise. Since the vulnerability requires user interaction, phishing campaigns could leverage this flaw to target employees or customers. Additionally, the reflected XSS could be chained with other attacks to escalate impact. Given the widespread use of WordPress in Europe, especially among SMEs and public sector websites, the vulnerability could affect a broad range of organizations if unpatched. However, the lack of known exploits reduces immediate risk, though the medium severity score indicates that timely remediation is advisable to prevent future exploitation.
Mitigation Recommendations
1. Immediate upgrade or patching: Organizations should verify the version of the Feedify – Web Push Notifications plugin and update to a version beyond 2.1.8 if available, or apply any vendor-provided patches. 2. Input validation and sanitization: If custom modifications exist, ensure that the 'feedify_msg' parameter is properly sanitized and encoded before output to prevent script injection. 3. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block malicious payloads targeting the 'feedify_msg' parameter. 4. User awareness: Educate users and administrators about the risks of clicking on suspicious links that could exploit reflected XSS vulnerabilities. 5. Content Security Policy (CSP): Implement strict CSP headers to restrict execution of unauthorized scripts, mitigating the impact of XSS. 6. Monitoring and logging: Enable detailed logging of web requests to detect anomalous access patterns or injection attempts targeting the plugin. 7. Regular vulnerability scanning: Incorporate scanning tools that specifically check for known WordPress plugin vulnerabilities, including Feedify, to identify and remediate issues proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2021-38352: CWE-79 Cross-site Scripting (XSS) in Feedify – Web Push Notifications Feedify – Web Push Notifications
Description
The Feedify – Web Push Notifications WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the feedify_msg parameter found in the ~/includes/base.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.1.8.
AI-Powered Analysis
Technical Analysis
CVE-2021-38352 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Feedify – Web Push Notifications WordPress plugin, specifically affecting versions up to and including 2.1.8. The vulnerability arises from improper sanitization of the 'feedify_msg' parameter in the ~/includes/base.php file. An attacker can craft a malicious URL containing a payload in this parameter, which when visited by a user, causes the injected script to be executed in the context of the victim's browser. This reflected XSS does not require authentication but does require user interaction, such as clicking a malicious link. The vulnerability impacts confidentiality and integrity by potentially allowing attackers to steal session cookies, perform actions on behalf of the user, or manipulate the content displayed to the user. The CVSS 3.1 base score is 6.1 (medium severity), with an attack vector of network (remote), low attack complexity, no privileges required, user interaction required, and scope changed due to impact beyond the vulnerable component. No known exploits in the wild have been reported to date. The plugin is widely used for web push notifications in WordPress sites, which are common across various industries. The vulnerability is typical of CWE-79, where insufficient input validation leads to script injection and execution in the victim's browser environment.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the vulnerable Feedify plugin for push notifications. Successful exploitation could lead to session hijacking, defacement, or redirection to malicious sites, impacting user trust and potentially leading to data leakage or unauthorized actions on affected websites. Organizations in sectors with high web presence such as e-commerce, media, and public services could see reputational damage and user data compromise. Since the vulnerability requires user interaction, phishing campaigns could leverage this flaw to target employees or customers. Additionally, the reflected XSS could be chained with other attacks to escalate impact. Given the widespread use of WordPress in Europe, especially among SMEs and public sector websites, the vulnerability could affect a broad range of organizations if unpatched. However, the lack of known exploits reduces immediate risk, though the medium severity score indicates that timely remediation is advisable to prevent future exploitation.
Mitigation Recommendations
1. Immediate upgrade or patching: Organizations should verify the version of the Feedify – Web Push Notifications plugin and update to a version beyond 2.1.8 if available, or apply any vendor-provided patches. 2. Input validation and sanitization: If custom modifications exist, ensure that the 'feedify_msg' parameter is properly sanitized and encoded before output to prevent script injection. 3. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block malicious payloads targeting the 'feedify_msg' parameter. 4. User awareness: Educate users and administrators about the risks of clicking on suspicious links that could exploit reflected XSS vulnerabilities. 5. Content Security Policy (CSP): Implement strict CSP headers to restrict execution of unauthorized scripts, mitigating the impact of XSS. 6. Monitoring and logging: Enable detailed logging of web requests to detect anomalous access patterns or injection attempts targeting the plugin. 7. Regular vulnerability scanning: Incorporate scanning tools that specifically check for known WordPress plugin vulnerabilities, including Feedify, to identify and remediate issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-08-09T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbeb973
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 3:57:40 AM
Last updated: 8/4/2025, 7:31:54 PM
Views: 23
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.