CVE-2021-25093
📋 TL;DR
The Link Library WordPress plugin before version 7.2.8 has an authorization vulnerability that allows unauthenticated users to delete arbitrary links via crafted requests. This affects all WordPress sites running vulnerable versions of the plugin. Attackers can delete important links without requiring any authentication.
💻 Affected Systems
- Link Library WordPress plugin
📦 What is this software?
Link Library by Ylefebvre
⚠️ Risk & Real-World Impact
Worst Case
Attackers delete all links including critical navigation, affiliate, or resource links, causing website functionality disruption and potential business impact.
Likely Case
Attackers delete random or targeted links, causing broken navigation and user experience issues on affected WordPress sites.
If Mitigated
No impact if plugin is patched or proper access controls are implemented.
🎯 Exploit Status
Simple HTTP request manipulation required. No authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.2.8
Vendor Advisory: https://wpscan.com/vulnerability/7a7603ce-d76d-4c49-a886-67653bed8cd3
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Link Library plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 7.2.8+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable Link Library plugin
allTemporarily deactivate the vulnerable plugin until patched.
wp plugin deactivate link-library
Web Application Firewall rule
allBlock unauthorized link deletion requests at WAF level.
🧯 If You Can't Patch
- Implement strict network access controls to limit plugin access to trusted IPs only.
- Monitor and alert on unauthorized link deletion attempts in WordPress logs.
🔍 How to Verify
Check if Vulnerable:
Check Link Library plugin version in WordPress admin panel under Plugins.
Check Version:
wp plugin get link-library --field=version
Verify Fix Applied:
Confirm plugin version is 7.2.8 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated POST requests to link deletion endpoints
- Multiple link deletion events from single IP
Network Indicators:
- HTTP POST requests to /wp-admin/admin-ajax.php with action=delete_link from unauthenticated sources
SIEM Query:
source="wordpress.log" AND "action=delete_link" AND NOT user_id=*