CVE-2023-7231
📋 TL;DR
The illi Link Party! WordPress plugin through version 1.0 has an access control vulnerability that allows unauthenticated visitors to delete links. This affects all WordPress sites running the vulnerable plugin version. Attackers can disrupt website functionality by removing important links without authentication.
💻 Affected Systems
- illi Link Party! WordPress plugin
📦 What is this software?
Illi Link Party\! by Evanliewer
⚠️ Risk & Real-World Impact
Worst Case
Complete deletion of all links on the website, disrupting navigation and functionality, potentially causing business impact or SEO damage.
Likely Case
Selective deletion of important links (contact forms, product pages, navigation menus) leading to user frustration and reduced website usability.
If Mitigated
No impact if proper authentication checks are implemented before allowing link deletion operations.
🎯 Exploit Status
The vulnerability is simple to exploit as it requires no authentication and likely involves direct API endpoint access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: https://wpscan.com/vulnerability/797692ce-f355-4d4a-af01-4bd9abc60a34/
Restart Required: No
Instructions:
1. Deactivate the illi Link Party! plugin immediately. 2. Remove the plugin from your WordPress installation. 3. Monitor for any official patch from the plugin developer.
🔧 Temporary Workarounds
Disable plugin via wp-cli
linuxDeactivate the vulnerable plugin using WordPress command-line interface
wp plugin deactivate illi-link-party
Web application firewall rule
allBlock requests to the plugin's deletion endpoints
🧯 If You Can't Patch
- Deactivate the illi Link Party! plugin immediately
- Implement web application firewall rules to block unauthenticated requests to plugin endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for 'illi Link Party!' version 1.0 or earlier
Check Version:
wp plugin list --name='illi Link Party!' --field=version
Verify Fix Applied:
Verify the plugin is either deactivated or removed from the plugins directory
📡 Detection & Monitoring
Log Indicators:
- Unusual POST/DELETE requests to plugin endpoints from unauthenticated IPs
- 404 errors for previously working links
Network Indicators:
- HTTP requests to /wp-content/plugins/illi-link-party/ endpoints without authentication headers
SIEM Query:
source="web_server" AND (uri="*illi-link-party*" AND (method="POST" OR method="DELETE") AND NOT user_agent="*admin*" AND NOT auth_token="*")