The Link Library plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the searchll parameter in all versions up to, and including, 7.6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 31 Jan 2025 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Ylefebvre
Ylefebvre link Library
Weaknesses CWE-79
CPEs cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*
Vendors & Products Ylefebvre
Ylefebvre link Library

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-26T18:13:24.181Z

Reserved: 2024-03-08T15:15:57.280Z

Link: CVE-2024-2325

cve-icon Vulnrichment

Updated: 2024-08-01T19:11:53.458Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-09T19:15:31.683

Modified: 2025-01-31T01:53:16.193

Link: CVE-2024-2325

cve-icon Redhat

No data.