Description
Cross-Site Request Forgery (CSRF) vulnerability in QuantumCloud Simple Link Directory simple-link-directory allows Cross Site Request Forgery.This issue affects Simple Link Directory: from n/a through <= 8.8.3.
Published: 2025-12-09
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A cross‑site request forgery flaw is present in the QuantumCloud Simple Link Directory WordPress plugin. The vulnerability allows an attacker to send forged requests on behalf of an authenticated user, but the CVE description does not specify which operations are affected; it only indicates that unauthorized actions could be performed. The weakness is catalogued as CWE‑352 and primarily threatens data integrity by allowing an attacker to manipulate the link directory’s contents.

Affected Systems

All sites that have installed the QuantumCloud Simple Link Directory plugin version 8.8.3 or earlier are vulnerable. The flaw applies to any site running the plugin from the QuantumCloud distribution without the patch released for version 8.8.4 or later.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity. The EPSS score of less than 1 % suggests a very low exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that exploitation would involve a victim who is authenticated to the site visiting a malicious page that causes a forged request to the WordPress backend. The CVE does not specify whether elevated privileges are required; it only states that unauthorized actions could be performed if the request is accepted.

Generated by OpenCVE AI on April 30, 2026 at 14:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Simple Link Directory plugin to version 8.8.4 or later to apply the vendor’s fix.
  • If an upgrade cannot be performed immediately, limit the plugin’s ability to perform actions that could be targeted by CSRF until the plugin is patched.
  • Enable a site‑wide CSRF protection plugin, such as Wordfence or iThemes Security, to add an additional layer of defense against cross‑site request forgery across all plugins.

Generated by OpenCVE AI on April 30, 2026 at 14:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 11 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Quantumcloud
Quantumcloud simple Link Directory
Wordpress
Wordpress wordpress
Vendors & Products Quantumcloud
Quantumcloud simple Link Directory
Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 14:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in QuantumCloud Simple Link Directory simple-link-directory allows Cross Site Request Forgery.This issue affects Simple Link Directory: from n/a through <= 8.8.3.
Title WordPress Simple Link Directory plugin <= 8.8.3 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Quantumcloud Simple Link Directory
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:19.420Z

Reserved: 2025-12-08T16:00:53.488Z

Link: CVE-2025-67465

cve-icon Vulnrichment

Updated: 2025-12-11T19:03:02.587Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:18:22.483

Modified: 2026-04-27T18:16:39.120

Link: CVE-2025-67465

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:45:24Z

Weaknesses