cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forlink-library link-library

Direction: ascending
Jun 07, 2024

Link Library # CVE-2021-25093

CVE, Research URL

CVE-2021-25093

Application

Link Library

Date
Feb 01, 2022
Research Description
The Link Library WordPress plugin before 7.2.8 does not have authorisation in place when deleting links, allowing unauthenticated users to delete arbitrary links via a crafted request
Affected versions
Min -, max -.
Status
vulnerable

Link Library # CVE-2021-25091

CVE, Research URL

CVE-2021-25091

Application

Link Library

Date
Feb 01, 2022
Research Description
The Link Library WordPress plugin before 7.2.9 does not sanitise and escape the settingscopy parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting
Affected versions
Min -, max -.
Status
vulnerable

Link Library # CVE-2021-25092

CVE, Research URL

CVE-2021-25092

Application

Link Library

Date
Feb 01, 2022
Research Description
The Link Library WordPress plugin before 7.2.8 does not have CSRF check when resetting library settings, allowing attackers to make a logged in admin reset arbitrary settings via a CSRF attack
Affected versions
Min -, max -.
Status
vulnerable

Link Library # CVE-2022-4199

CVE, Research URL

CVE-2022-4199

Application

Link Library

Date
Jan 16, 2023
Research Description
The Link Library WordPress plugin before 7.4.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Affected versions
Min -, max -.
Status
vulnerable

Link Library # CVE-2024-1559

CVE, Research URL

CVE-2024-1559

Application

Link Library

Date
Feb 20, 2024
Research Description
The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'll_reciprocal' parameter in all versions up to, and including, 7.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable

Link Library # CVE-2024-4281

CVE, Research URL

CVE-2024-4281

Application

Link Library

Date
May 08, 2024
Research Description
The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'link-library' shortcode in all versions up to, and including, 7.6.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable

Link Library # CVE-2024-2325

CVE, Research URL

CVE-2024-2325

Application

Link Library

Date
Apr 10, 2024
Research Description
The Link Library plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the searchll parameter in all versions up to, and including, 7.6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable

Link Library # CVE-2024-29123

CVE, Research URL

CVE-2024-29123

Application

Link Library

Date
Mar 19, 2024
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yannick Lefebvre Link Library allows Reflected XSS.This issue affects Link Library: from n/a through 7.6.
Affected versions
Min -, max -.
Status
vulnerable

Link Library # CVE-2024-24879

CVE, Research URL

CVE-2024-24879

Application

Link Library

Date
Feb 08, 2024
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yannick Lefebvre Link Library allows Reflected XSS.This issue affects Link Library: from n/a through 7.5.13.
Affected versions
Min -, max -.
Status
vulnerable

Link Library # CVE-2024-24875

CVE, Research URL

CVE-2024-24875

Application

Link Library

Date
Feb 12, 2024
Research Description
Cross-Site Request Forgery (CSRF) vulnerability in Yannick Lefebvre Link Library.This issue affects Link Library: from n/a through 7.5.13.
Affected versions
Min -, max -.
Status
vulnerable
Jun 10, 2024

Link Library # CVE-2024-35687

CVE, Research URL

CVE-2024-35687

Application

Link Library

Date
Jun 08, 2024
Research Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Yannick Lefebvre Link Library link-library allows Reflected XSS.This issue affects Link Library: from n/a through 7.6.3.
Affected versions
Min -, max -.
Status
vulnerable
Jul 15, 2024

Link Library # CVE-2024-38711

CVE, Research URL

CVE-2024-38711

Application

Link Library

Date
Jul 20, 2024
Research Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Yannick Lefebvre Link Library allows Reflected XSS.This issue affects Link Library: from n/a through 7.7.1.
Affected versions
Min -, max -.
Status
vulnerable
Jan 22, 2025

Link Library # CVE-2024-13404

CVE, Research URL

CVE-2024-13404

Application

Link Library

Date
Jan 21, 2025
Research Description
The Link Library plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'searchll' parameter in all versions up to, and including, 7.7.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable
Apr 05, 2025

Link Library # CVE-2025-2889

CVE, Research URL

CVE-2025-2889

Application

Link Library

Date
Apr 05, 2025
Research Description
The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Link Additional Parameters in all versions up to, and including, 7.7.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable