Description
The broken-link-checker plugin through 1.11.8 for WordPress (aka Broken Link Checker) is susceptible to Reflected XSS due to improper encoding and insertion of an HTTP GET parameter into HTML. The filter function on the page listing all detected broken links can be exploited by providing an XSS payload in the s_filter GET parameter in a filter_id=search request. NOTE: this is an end-of-life product.
References (4)
Core 4
Core References
Product, Third Party Advisory x_refsource_misc
https://wordpress.org/plugins/broken-link-checker/#developers
Exploit, Third Party Advisory x_refsource_misc
https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-02_WordPress_Plugin_Broken_Link_Checker
Exploit, Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2019/10/16/3
Third Party Advisory x_refsource_misc
https://wpvulndb.com/vulnerabilities/9917
Scores
CVSS v3
6.1
EPSS
0.0027
EPSS Percentile
50.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (1)
managewp/broken_link_checker
< 1.11.8
Published
Oct 16, 2019
Tracked Since
Feb 18, 2026