Skip to main content

CVE-2021-38352: CWE-79 Cross-site Scripting (XSS) in Feedify – Web Push Notifications Feedify – Web Push Notifications

Medium
VulnerabilityCVE-2021-38352cvecve-2021-38352cwe-79
Published: Fri Sep 10 2021 (09/10/2021, 13:33:12 UTC)
Source: CVE
Vendor/Project: Feedify – Web Push Notifications
Product: Feedify – Web Push Notifications

Description

The Feedify – Web Push Notifications WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the feedify_msg parameter found in the ~/includes/base.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.1.8.

AI-Powered Analysis

AILast updated: 06/26/2025, 03:57:40 UTC

Technical Analysis

CVE-2021-38352 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Feedify – Web Push Notifications WordPress plugin, specifically affecting versions up to and including 2.1.8. The vulnerability arises from improper sanitization of the 'feedify_msg' parameter in the ~/includes/base.php file. An attacker can craft a malicious URL containing a payload in this parameter, which when visited by a user, causes the injected script to be executed in the context of the victim's browser. This reflected XSS does not require authentication but does require user interaction, such as clicking a malicious link. The vulnerability impacts confidentiality and integrity by potentially allowing attackers to steal session cookies, perform actions on behalf of the user, or manipulate the content displayed to the user. The CVSS 3.1 base score is 6.1 (medium severity), with an attack vector of network (remote), low attack complexity, no privileges required, user interaction required, and scope changed due to impact beyond the vulnerable component. No known exploits in the wild have been reported to date. The plugin is widely used for web push notifications in WordPress sites, which are common across various industries. The vulnerability is typical of CWE-79, where insufficient input validation leads to script injection and execution in the victim's browser environment.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites using the vulnerable Feedify plugin for push notifications. Successful exploitation could lead to session hijacking, defacement, or redirection to malicious sites, impacting user trust and potentially leading to data leakage or unauthorized actions on affected websites. Organizations in sectors with high web presence such as e-commerce, media, and public services could see reputational damage and user data compromise. Since the vulnerability requires user interaction, phishing campaigns could leverage this flaw to target employees or customers. Additionally, the reflected XSS could be chained with other attacks to escalate impact. Given the widespread use of WordPress in Europe, especially among SMEs and public sector websites, the vulnerability could affect a broad range of organizations if unpatched. However, the lack of known exploits reduces immediate risk, though the medium severity score indicates that timely remediation is advisable to prevent future exploitation.

Mitigation Recommendations

1. Immediate upgrade or patching: Organizations should verify the version of the Feedify – Web Push Notifications plugin and update to a version beyond 2.1.8 if available, or apply any vendor-provided patches. 2. Input validation and sanitization: If custom modifications exist, ensure that the 'feedify_msg' parameter is properly sanitized and encoded before output to prevent script injection. 3. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block malicious payloads targeting the 'feedify_msg' parameter. 4. User awareness: Educate users and administrators about the risks of clicking on suspicious links that could exploit reflected XSS vulnerabilities. 5. Content Security Policy (CSP): Implement strict CSP headers to restrict execution of unauthorized scripts, mitigating the impact of XSS. 6. Monitoring and logging: Enable detailed logging of web requests to detect anomalous access patterns or injection attempts targeting the plugin. 7. Regular vulnerability scanning: Incorporate scanning tools that specifically check for known WordPress plugin vulnerabilities, including Feedify, to identify and remediate issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-08-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb973

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 3:57:40 AM

Last updated: 8/4/2025, 7:31:54 PM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats