First published: Fri Feb 09 2024(Updated: )
The Internal Link Juicer: SEO Auto Linker for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings such as 'ilj_settings_field_links_per_page' in all versions up to, and including, 2.23.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internallinkjuicer Internal Link Juicer | <2.23.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-0657 is rated as medium due to the potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-0657, update the Internal Link Juicer plugin to version 2.23.5 or later.
All versions up to and including 2.23.4 of the Internal Link Juicer plugin are affected by CVE-2024-0657.
CVE-2024-0657 can lead to Stored Cross-Site Scripting attacks, allowing attackers to inject malicious scripts.
Any user of the Internal Link Juicer plugin for WordPress using versions up to 2.23.4 is affected by CVE-2024-0657.