Impact
The Broken Link Notifier plugin allows an unauthenticated attacker to cause the web application to issue HTTP requests to arbitrary destinations through the ajax_blinks() handler. This Server‑Side Request Forgery can be used to interrogate or change data from internal services, potentially exposing sensitive information or undermining service integrity. The weakness is identified as CWE‑918 and presents a security impact that includes confidentiality, integrity, and availability concerns for internal resources.
Affected Systems
The vulnerability affects the PluginRX "Broken Link Notifier" WordPress plugin in all releases up to and including version 1.3.0. Any WordPress site that has a version of this plugin in that range is potentially vulnerable.
Risk and Exploitability
With a CVSS score of 7.2, the vulnerability is considered high severity. The EPSS score of 2% indicates a moderate likelihood that exploitation will occur, and the issue is not yet listed in the CISA KEV catalog. Attack vectors require an unauthenticated HTTP request to the plugin’s AJAX endpoint, suggesting that attackers could be any external user who can submit a crafted request to the site.
OpenCVE Enrichment
EUVD