Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total8
Critical0
High1
Medium7
Reset
Showing 1-8 of 8 records
Threat Entry Updated 2025-04-07

CVE-2025-2889 - Link Library Plugin

The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Link Additional Parameters in all versions up to, and including, 7.7.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Link Library

CVE-2025-2889

MEDIUM CVSS 6.4 2025-04-05
Threat Entry Updated 2025-01-31

CVE-2024-13404 - Link Library Plugin

The Link Library plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'searchll' parameter in all versions up to, and including, 7.7.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Link Library

CVE-2024-13404

MEDIUM CVSS 6.1 2025-01-21
Threat Entry Updated 2025-02-03

CVE-2024-4281 - Link Library Plugin

The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'link-library' shortcode in all versions up to, and including, 7.6.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Link Library

CVE-2024-4281

MEDIUM CVSS 6.4 2024-05-08
Threat Entry Updated 2025-01-31

CVE-2024-2325 - Link Library Plugin

The Link Library plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the searchll parameter in all versions up to, and including, 7.6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Link Library

CVE-2024-2325

MEDIUM CVSS 6.1 2024-04-09
Threat Entry Updated 2025-02-05

CVE-2024-1559 - Link Library Plugin

The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'll_reciprocal' parameter in all versions up to, and including, 7.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Link Library

CVE-2024-1559

MEDIUM CVSS 6.5 2024-02-20
Threat Entry Updated 2024-11-21

CVE-2021-25093 - Link Library Plugin

The Link Library WordPress plugin before 7.2.8 does not have authorisation in place when deleting links, allowing unauthenticated users to delete arbitrary links via a crafted request

PLUGIN Link Library

CVE-2021-25093

HIGH CVSS 7.5 2022-02-01
Threat Entry Updated 2024-11-21

CVE-2021-25092 - Link Library Plugin

The Link Library WordPress plugin before 7.2.8 does not have CSRF check when resetting library settings, allowing attackers to make a logged in admin reset arbitrary settings via a CSRF attack

PLUGIN Link Library

CVE-2021-25092

MEDIUM CVSS 6.5 2022-02-01
Threat Entry Updated 2024-11-21

CVE-2021-25091 - Link Library Plugin

The Link Library WordPress plugin before 7.2.9 does not sanitise and escape the settingscopy parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting

PLUGIN Link Library

CVE-2021-25091

MEDIUM CVSS 6.1 2022-02-01
Scroll to top