Description
Cross-Site Request Forgery (CSRF) vulnerability in Rajesh Broken Links Remover broken-links-remover allows Stored XSS.This issue affects Broken Links Remover: from n/a through <= 1.2.2.
Published: 2025-04-17
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A Cross‑Site Request Forgery vulnerability in the Rajesh Broken Links Remover WordPress plugin permits an attacker to inject and store malicious JavaScript. The flaw allows two independent steps: a forged request changes the plugin’s internal link list and stores attacker‑supplied code that will run in the browsers of any visitor to the affected site. The consequence is a classic stored Cross‑Site Scripting event, which can lead to session hijacking, credential theft, or defacement of the site. The weakness is identified as an improper CSRF protection (CWE‑352).

Affected Systems

WordPress sites using the Rajesh Broken Links Remover plugin of version 1.2.2 or earlier are affected. The vulnerability applies to all releases from the initial version up to and including 1.2.2; no specific sub‑versions are differentiated.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity with both confidentiality and integrity in risk. The EPSS score of less than 1% suggests that, at present, the exploit is unlikely to be widespread in the wild, yet the impact of a successful attack remains severe. The official CISA KEV listing is absent, meaning the vulnerability has not yet been confirmed in active exploitation campaigns. Likely, an attacker would need to be a WordPress user with sufficient privileges to invoke the plugin’s link removal functionality or trick an admin into executing a crafted request. Since the flaw relies on CSRF, an unauthenticated attacker could force an authenticated user to submit the malicious request, making the vulnerability exploitable in a realistic threat scenario.

Generated by OpenCVE AI on April 30, 2026 at 22:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Broken Links Remover plugin to the latest version (greater than 1.2.2).
  • If the plugin is not required for site operations, uninstall or disable it entirely to eliminate the attack surface.
  • Ensure that any remaining use of the plugin is limited to administrators and that CSRF tokens or same‑site cookies are enforced to prevent unauthorized request forging.

Generated by OpenCVE AI on April 30, 2026 at 22:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11572 Cross-Site Request Forgery (CSRF) vulnerability in Rajesh Broken Links Remover allows Stored XSS. This issue affects Broken Links Remover: from n/a through 1.2.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Rajesh Broken Links Remover allows Stored XSS. This issue affects Broken Links Remover: from n/a through 1.2.2. Cross-Site Request Forgery (CSRF) vulnerability in Rajesh Broken Links Remover broken-links-remover allows Stored XSS.This issue affects Broken Links Remover: from n/a through <= 1.2.2.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Thu, 17 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 17 Apr 2025 15:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Rajesh Broken Links Remover allows Stored XSS. This issue affects Broken Links Remover: from n/a through 1.2.2.
Title WordPress Broken Links Remover plugin <= 1.2.2 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:31.464Z

Reserved: 2025-04-16T06:23:22.137Z

Link: CVE-2025-39440

cve-icon Vulnrichment

Updated: 2025-04-17T15:58:07.384Z

cve-icon NVD

Status : Deferred

Published: 2025-04-17T16:15:54.497

Modified: 2026-04-23T15:29:33.530

Link: CVE-2025-39440

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T22:30:02Z

Weaknesses