First published: Thu Dec 19 2024(Updated: )
The Broken Link Checker | Finder plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.5.0 via the 'moblc_check_link' function. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broken Link Checker | <=2.5.0 | |
WordPress |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12121 is classified as a medium severity vulnerability due to its potential for exploitation by authenticated attackers.
To mitigate CVE-2024-12121, update the Broken Link Checker Finder plugin to version 2.5.1 or later.
CVE-2024-12121 affects all users of the Broken Link Checker Finder plugin for WordPress with versions up to and including 2.5.0.
CVE-2024-12121 is a Blind Server-Side Request Forgery vulnerability.
Authenticated attackers with Author-level access and above can exploit CVE-2024-12121 to make unauthorized requests to internal services.