Description
The [CR]Paid Link Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the URL path in all versions up to, and including, 0.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-03-18
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Patch Now
AI Analysis

Impact

The paid link manager plugin for WordPress is vulnerable to reflected cross‑site scripting via the URL path in all releases up to and including version 0.5. The flaw is caused by insufficient input sanitization and output escaping, allowing an unauthenticated attacker to inject arbitrary client‑side scripts that will execute in a victim’s browser if the victim follows a crafted link.

Affected Systems

The vulnerability affects installations of the silentwind:[CR]Paid Link Manager plugin on WordPress sites. Every version from the initial release through 0.5 inclusive is compromised; no patch release is identified in the provided data.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity. No EPSS score is available and the issue is not listed in the CISA KEV catalog, suggesting no publicly documented exploitation at this time. Exploitation requires an unauthenticated attacker to craft a malicious URL and have a user click that link, triggering the injected script in the user’s browser.

Generated by OpenCVE AI on March 18, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the plugin’s repository or vendor website for a newer version and upgrade immediately if available.
  • If no updated release exists, disable or uninstall the plugin to eliminate the vulnerability.
  • Verify the currently installed plugin version via the WordPress admin interface or WP‑CLI to ensure it is not affected.

Generated by OpenCVE AI on March 18, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Silentwind
Silentwind [cr]paid Link Manager
Wordpress
Wordpress wordpress
Vendors & Products Silentwind
Silentwind [cr]paid Link Manager
Wordpress
Wordpress wordpress

Wed, 18 Mar 2026 04:15:00 +0000

Type Values Removed Values Added
Description The [CR]Paid Link Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the URL path in all versions up to, and including, 0.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title [CR]Paid Link Manager <= 0.5 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Silentwind [cr]paid Link Manager
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:29:56.504Z

Reserved: 2026-02-02T20:26:05.454Z

Link: CVE-2026-1780

cve-icon Vulnrichment

Updated: 2026-03-18T14:30:26.184Z

cve-icon NVD

Status : Deferred

Published: 2026-03-18T04:17:14.073

Modified: 2026-04-22T21:32:08.360

Link: CVE-2026-1780

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:59:22Z

Weaknesses