Vulnerabilities and security researches forlink-library link-library
Direction: ascendingJun 07, 2024
Link Library # CVE-2021-25093
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 01, 2022
- Research Description
- The Link Library WordPress plugin before 7.2.8 does not have authorisation in place when deleting links, allowing unauthenticated users to delete arbitrary links via a crafted request
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Link Library # CVE-2021-25091
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 01, 2022
- Research Description
- The Link Library WordPress plugin before 7.2.9 does not sanitise and escape the settingscopy parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Link Library # CVE-2021-25092
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 01, 2022
- Research Description
- The Link Library WordPress plugin before 7.2.8 does not have CSRF check when resetting library settings, allowing attackers to make a logged in admin reset arbitrary settings via a CSRF attack
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Link Library # CVE-2022-4199
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 16, 2023
- Research Description
- The Link Library WordPress plugin before 7.4.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Link Library # CVE-2024-1559
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 20, 2024
- Research Description
- The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'll_reciprocal' parameter in all versions up to, and including, 7.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Link Library # CVE-2024-4281
- CVE, Research URL
- Home page URL
- Application
- Date
- May 08, 2024
- Research Description
- The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'link-library' shortcode in all versions up to, and including, 7.6.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Link Library # CVE-2024-2325
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 10, 2024
- Research Description
- The Link Library plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the searchll parameter in all versions up to, and including, 7.6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Link Library # CVE-2024-29123
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 19, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yannick Lefebvre Link Library allows Reflected XSS.This issue affects Link Library: from n/a through 7.6.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Link Library # CVE-2024-24879
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 08, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yannick Lefebvre Link Library allows Reflected XSS.This issue affects Link Library: from n/a through 7.5.13.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Link Library # CVE-2024-24875
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 12, 2024
- Research Description
- Cross-Site Request Forgery (CSRF) vulnerability in Yannick Lefebvre Link Library.This issue affects Link Library: from n/a through 7.5.13.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jun 10, 2024
Link Library # CVE-2024-35687
- CVE, Research URL
- Home page URL
- Application
- Date
- Jun 08, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Yannick Lefebvre Link Library link-library allows Reflected XSS.This issue affects Link Library: from n/a through 7.6.3.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jul 15, 2024
Link Library # CVE-2024-38711
- CVE, Research URL
- Home page URL
- Application
- Date
- Jul 20, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Yannick Lefebvre Link Library allows Reflected XSS.This issue affects Link Library: from n/a through 7.7.1.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jan 22, 2025
Link Library # CVE-2024-13404
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 21, 2025
- Research Description
- The Link Library plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'searchll' parameter in all versions up to, and including, 7.7.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Apr 05, 2025
Link Library # CVE-2025-2889
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 05, 2025
- Research Description
- The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Link Additional Parameters in all versions up to, and including, 7.7.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable