First published: Tue Feb 01 2022(Updated: )
The Link Library WordPress plugin before 7.2.9 does not sanitise and escape the settingscopy parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ylefebvre Link Library | <7.2.9 | |
Link Library WordPress | <7.2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25091 is classified as a medium severity vulnerability due to its potential for exploitation via reflected cross-site scripting.
To fix CVE-2021-25091, update the Link Library WordPress plugin to version 7.2.9 or later as it includes the necessary sanitization and escaping measures.
CVE-2021-25091 affects users of the Link Library WordPress plugin prior to version 7.2.9.
CVE-2021-25091 is a reflected cross-site scripting (XSS) vulnerability.
Yes, CVE-2021-25091 can be exploited without authentication, allowing an attacker to execute scripts in the context of the affected admin page.