CVE-2025-2889Cross-site Scripting in Link Library

Severity
6.4MEDIUMNVD
EPSS
0.2%
top 62.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 5

Description

The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Link Additional Parameters in all versions up to, and including, 7.7.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:NExploitability: 3.1 | Impact: 2.7

Affected Packages1 packages

CVEListV5jackdewey/link_library7.7.3

🔴Vulnerability Details

2
GHSA
GHSA-rp6w-32qw-r275: The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Link Additional Parameters in all versions up to, and inclu2025-04-05
CVEList
Link Library <= 7.7.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Link Additional Parameters2025-04-04

📋Vendor Advisories

1
Microsoft
Use After Free in vim/vim2022-08-09
CVE-2025-2889 — Cross-site Scripting in Link Library | cvebase