First published: Tue Feb 01 2022(Updated: )
The Link Library WordPress plugin before 7.2.8 does not have CSRF check when resetting library settings, allowing attackers to make a logged in admin reset arbitrary settings via a CSRF attack
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ylefebvre Link Library | <7.2.8 | |
Link Library WordPress | <7.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25092 has a medium severity rating due to the potential for unauthorized changes to library settings through CSRF attacks.
To fix CVE-2021-25092, update the Link Library WordPress plugin to version 7.2.8 or later.
CVE-2021-25092 allows attackers to execute CSRF attacks to reset arbitrary library settings on a compromised WordPress site.
CVE-2021-25092 affects all versions of the Link Library plugin prior to 7.2.8.
Administrators of WordPress sites using the affected versions of the Link Library plugin are at risk of unauthorized settings changes.