Description
The Auto Affiliate Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 6.8.8 This is due to insufficient input sanitization on the 'url' POST parameter in the aal_url_stats_save_action() function and a complete absence of output escaping in aal_display_clicks(), where the stored value is echoed directly into an anchor element's href attribute and inner text without esc_url(), esc_attr(), or esc_html(). This makes it possible for unauthenticated attackers to inject arbitrary web scripts into the admin statistics page that execute in an administrator's browser when the page is visited, leveraging a publicly exposed nonce and an unauthenticated AJAX endpoint registered via the wp_ajax_nopriv_ hook.
Published: 2026-05-08
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Auto Affiliate Links plugin for WordPress contains a stored XSS flaw in versions up to and including 6.8.8. Unauthenticated attackers can submit arbitrary JavaScript through the 'url' POST parameter, which is later echoed into the admin statistics page without any output escaping. This flaw allows a malicious script to execute in the browser of any administrator who views the affected page, potentially leading to session hijacking, credential theft, or other malicious actions performed under the administrator’s authority.

Affected Systems

The vulnerability affects thedark's Auto Affiliate Links plugin for WordPress, specifically all releases dated 6.8.8 or earlier. WordPress sites running any of those releases are at risk. No other vendors or products are impacted according to the CNA record.

Risk and Exploitability

The CVSS score of 7.2 categorizes this flaw as high severity, and the EPSS score is not available, indicating no published data on exploitation frequency. The flaw is not listed in CISA’s KEV catalog. Attackers can exploit it through a publicly exposed AJAX endpoint that requires no authentication, making the attack vector remote and easy to reach. By injecting script into the stored link value, an attacker can run arbitrary code in the administrator’s browser whenever the statistics page is accessed.

Generated by OpenCVE AI on May 8, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Auto Affiliate Links plugin to the latest available version that removes the XSS vulnerability.
  • If upgrading is not immediately possible, deactivate or uninstall the plugin to eliminate the attack surface.
  • As a temporary measure, delete all existing statistics entries or sanitize the stored 'url' values to prevent stored malicious content from being rendered.

Generated by OpenCVE AI on May 8, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 09:00:00 +0000

Type Values Removed Values Added
Description The Auto Affiliate Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 6.8.8 This is due to insufficient input sanitization on the 'url' POST parameter in the aal_url_stats_save_action() function and a complete absence of output escaping in aal_display_clicks(), where the stored value is echoed directly into an anchor element's href attribute and inner text without esc_url(), esc_attr(), or esc_html(). This makes it possible for unauthenticated attackers to inject arbitrary web scripts into the admin statistics page that execute in an administrator's browser when the page is visited, leveraging a publicly exposed nonce and an unauthenticated AJAX endpoint registered via the wp_ajax_nopriv_ hook.
Title Auto Affiliate Links <= 6.8.8 - Unauthenticated Stored Cross-Site Scripting via 'url' Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-08T08:26:33.373Z

Reserved: 2026-04-28T18:53:39.258Z

Link: CVE-2026-7330

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T09:16:10.100

Modified: 2026-05-08T09:16:10.100

Link: CVE-2026-7330

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T10:30:06Z

Weaknesses