First published: Sat Jan 11 2025(Updated: )
The ClickWhale – Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.4.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
ClickWhale Link Manager | <=2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11327 is classified as a medium severity vulnerability due to Reflected Cross-Site Scripting risks.
To fix CVE-2024-11327, update the ClickWhale plugin to the latest version that includes appropriate escaping measures.
CVE-2024-11327 is a Reflected Cross-Site Scripting (XSS) vulnerability affecting the ClickWhale plugin.
All versions of the ClickWhale plugin up to and including 2.4.1 are vulnerable to CVE-2024-11327.
The developers of the ClickWhale plugin are responsible for releasing updates to address CVE-2024-11327.