PatchSiren

PatchSiren cyber security CVE debrief

CVE-2021-47957 Wordpress CVE debrief

CVE-2021-47957 describes a stored cross-site scripting issue in the Cookie Law Bar WordPress plugin version 1.2.1. An authenticated attacker who can submit the plugin’s Bar Message content may store malicious script that later runs in the browsers of site visitors, creating risk to sessions and data shown in the affected page.

Vendor
Wordpress
Product
Unknown
CVSS
MEDIUM 5.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-16
Original CVE updated
2026-05-16
Advisory published
2026-05-16
Advisory updated
2026-05-16

Who should care

WordPress site owners and administrators using Cookie Law Bar, especially environments where plugin settings are writable by non-admin or broadly delegated accounts. Security teams should also review any site that exposes the plugin’s message field to trusted-but-not-fully-privileged users.

Technical summary

The vulnerability is a stored XSS condition in the Cookie Law Bar plugin’s Bar Message field. The NVD record attributes the issue to CWE-79 and indicates the attack requires authentication and user interaction. Once malicious content is saved through the plugin settings page, it can execute in the browsers of users who view the site.

Defensive priority

Medium priority. The issue requires authenticated access, but stored XSS can affect all visitors to impacted pages and may enable cookie theft or other sensitive-data exposure if the plugin is present and writable by an attacker.

Recommended defensive actions

  • Confirm whether Cookie Law Bar is installed and whether the deployed version is 1.2.1 or otherwise affected.
  • Remove or update the plugin using an official source if a fixed version is available; otherwise disable and replace it.
  • Restrict access to the plugin settings page to the smallest possible administrative group.
  • Inspect the Bar Message field and related plugin settings for unexpected HTML or script content.
  • Review recent administrative activity and WordPress logs for unauthorized settings changes.
  • If exposure is suspected, rotate affected sessions and review for signs of cookie or token misuse.

Evidence notes

The debrief is based on the NVD CVE record and the linked references supplied in the source corpus, including the WordPress plugin page, the vendor advisory URL, and the VulnCheck reference list. The source description states that Cookie Law Bar 1.2.1 contains a stored XSS vulnerability in the Bar Message field affecting authenticated attackers.

Official resources

CVE record dates supplied with the source corpus show publication and modification on 2026-05-16T16:16:22.037Z. This debrief uses that CVE record timing and the referenced source links only; it does not infer an earlier issue date from the