PatchSiren

PatchSiren cyber security CVE debrief

CVE-2021-47910 Accesspressthemes CVE debrief

CVE-2021-47910 describes a stored cross-site scripting issue in AccessPress Social Icons 1.8.2. According to the supplied corpus, an authenticated attacker can place JavaScript payloads into the "icon title" field, and the malicious content is then executed when the plugin page is viewed. The key risk is that stored content is rendered back to users who access the plugin interface, allowing script execution in their browser.

Vendor
Accesspressthemes
Product
Unknown
CVSS
MEDIUM 5.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-10
Original CVE updated
2026-05-10
Advisory published
2026-05-10
Advisory updated
2026-05-10

Who should care

WordPress site operators, plugin maintainers, and administrators using AccessPress Social Icons 1.8.2 should review this issue, especially where authenticated users can edit plugin settings or content.

Technical summary

The supplied description identifies a stored XSS flaw affecting the plugin's "icon title" field. The vulnerability is authenticated (PR:L in the supplied CVSS vector) and requires user interaction to trigger (UI:P). The weakness is classified as CWE-79. Because the payload is stored and later rendered in the plugin interface, any user who views the affected page can be exposed to the injected script.

Defensive priority

Medium. The issue requires authentication, but it can persist in stored content and execute for viewers of the plugin interface, which raises the impact for shared WordPress admin environments.

Recommended defensive actions

  • Update or replace AccessPress Social Icons 1.8.2 if a fixed release is available from the vendor or WordPress plugin channel.
  • Restrict who can modify plugin settings or fields that are rendered in the interface, including the icon title field.
  • Review existing stored icon title values for unexpected markup or script-like content and remove suspicious entries.
  • Apply output encoding or sanitization in any custom integration that renders plugin-managed fields.
  • If the plugin is not needed, disable or remove it to eliminate exposure.

Evidence notes

The description supplied with the CVE states that AccessPress Social Icons 1.8.2 has a stored XSS vulnerability in the "icon title" field. The NVD metadata in the corpus classifies the weakness as CWE-79 and provides a CVSS v4 vector showing network attack, low privileges, and user interaction requirements. The corpus also links the vendor site, the WordPress plugin listing, a third-party reference, and a VulnCheck advisory.

Official resources

The supplied NVD record for CVE-2021-47910 is dated 2026-05-10T13:16:27.890Z in the provided corpus, with the same timestamp for both publication and modification. The corpus associates the record with public references to the vendor site,