CVE-2024-35687

7.1 HIGH

📋 TL;DR

This CVE describes a reflected cross-site scripting (XSS) vulnerability in the WordPress Link Library plugin. Attackers can inject malicious scripts via crafted URLs that execute when victims visit those links. All WordPress sites using Link Library versions up to 7.6.3 are affected.

💻 Affected Systems

Products:
  • WordPress Link Library plugin
Versions: All versions up to and including 7.6.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with Link Library plugin enabled are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress admin accounts, deface websites, or redirect users to malicious sites.

🟠

Likely Case

Attackers steal user session cookies or credentials, perform actions on behalf of authenticated users, or deliver malware through the compromised WordPress site.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before execution, preventing any impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited and require minimal technical skill to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.4 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/link-library/wordpress-link-library-plugin-7-6-3-reflected-cross-site-scripting-xss-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Link Library and click 'Update Now'. 4. Verify version is 7.6.4 or higher.

🔧 Temporary Workarounds

Disable Link Library plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate link-library

Implement WAF rules

all

Add web application firewall rules to block XSS payloads

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Use WordPress security plugins with XSS protection features

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Link Library version

Check Version:

wp plugin get link-library --field=version

Verify Fix Applied:

Verify Link Library plugin version is 7.6.4 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET/POST requests with script tags or JavaScript code in parameters
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing <script>, javascript:, or encoded XSS payloads in URL parameters

SIEM Query:

source="web_server_logs" AND ("<script>" OR "javascript:" OR "%3Cscript%3E") AND uri_path="*link-library*"

🔗 References

📤 Share & Export