CVE-2019-16521
Summary
| CVE | CVE-2019-16521 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-10-16 15:15:00 UTC |
| Updated | 2019-10-18 20:24:00 UTC |
| Description | The broken-link-checker plugin through 1.11.8 for WordPress (aka Broken Link Checker) is susceptible to Reflected XSS due to improper encoding and insertion of an HTTP GET parameter into HTML. The filter function on the page listing all detected broken links can be exploited by providing an XSS payload in the s_filter GET parameter in a filter_id=search request. NOTE: this is an end-of-life product. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Managewp | Broken Link Checker | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| oss-security - [SBA-ADV-20190913-02] CVE-2019-16521: WordPress Plugin - Broken Link Checker <= 1.11.8 - Reflected XSS | MLIST | www.openwall.com | Exploit, Mailing List, Third Party Advisory |
| advisories/2019/SBA-ADV-20190913-02_WordPress_Plugin_Broken_Link_Checker at public · sbaresearch/advisories · GitHub | MISC | github.com | Exploit, Third Party Advisory |
| Broken Link Checker <= 1.11.8 - Authenticated Cross-Site Scripting (XSS) | MISC | wpvulndb.com | Third Party Advisory |
| WordPress › Broken Link Checker « WordPress Plugins | MISC | wordpress.org | Product, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.