The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'link-library' shortcode in all versions up to, and including, 7.6.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Link Library <= 7.6.11 - Authenticated (Contributor+) Stored Cross-Site Scripting via link-library Shortcode |
Mon, 03 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ylefebvre
Ylefebvre link Library |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Ylefebvre
Ylefebvre link Library |
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-05-08T09:31:34.751Z
Updated: 2026-04-08T16:44:56.929Z
Reserved: 2024-04-26T22:23:53.696Z
Link: CVE-2024-4281
Updated: 2024-08-01T20:33:53.172Z
Status : Modified
Published: 2024-05-08T10:15:08.533
Modified: 2026-04-08T17:18:52.220
Link: CVE-2024-4281
No data.