First published: Wed Jun 07 2023(Updated: )
The Pretty Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting via various IP headers as well as the referer header in versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping in the track_link function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pretty Links | <2.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-25147 is classified as a high severity vulnerability due to its ability to allow stored cross-site scripting attacks.
To fix CVE-2019-25147, update the Pretty Links plugin to version 2.1.10 or later.
CVE-2019-25147 affects all versions of the Pretty Links plugin up to and including version 2.1.9.
CVE-2019-25147 can lead to client-side attacks, allowing attackers to execute malicious scripts in the context of users' browsers.
Anyone using the Pretty Links plugin for WordPress version 2.1.9 or earlier is vulnerable to CVE-2019-25147.