WordPress WP Links Page Plugin <= 4.9.4 is vulnerable to Cross Site Request Forgery (CSRF)
CVE-2023-47651
8.8HIGH
Summary
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the WP Links Page plugin by Robert Macchi. This vulnerability allows attackers to trick users into executing unwanted actions on web applications in which they are currently authenticated. This can lead to unauthorized changes or data manipulations, providing a potential pathway for exploitation. The affected versions range from an unspecified release up to 4.9.4, highlighting the need for users to ensure they are using an updated version of the plugin to mitigate risks associated with this vulnerability.
Affected Version(s)
WP Links Page <= 4.9.4
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
thiennv (Patchstack Alliance)