{"api_version":"1","generated_at":"2026-04-10T18:00:27+00:00","cve":"CVE-2015-10098","urls":{"html":"https://cve.report/CVE-2015-10098","api":"https://cve.report/api/cve/CVE-2015-10098.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2015-10098","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2015-10098"},"summary":{"title":"CVE-2015-10098","description":"A vulnerability was found in Broken Link Checker Plugin up to 1.10.5 on WordPress. It has been rated as problematic. Affected by this issue is the function print_module_list/show_warnings_section_notice/status_text/ui_get_action_links. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.10.6 is able to address this issue. The name of the patch is f30638869e281461b87548e40b517738b4350e47. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225152.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2023-04-08 09:15:00","updated_at":"2023-12-20 02:25:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/wp-plugins/broken-link-checker/releases/tag/1.10.6","name":"https://github.com/wp-plugins/broken-link-checker/releases/tag/1.10.6","refsource":"MISC","tags":["Release Notes"],"title":"Release Tag version 1.10.6 · wp-plugins/broken-link-checker · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://vuldb.com/?id.225152","name":"https://vuldb.com/?id.225152","refsource":"MISC","tags":["Third Party Advisory"],"title":"","mime":"text/plain","httpstatus":"429","archivestatus":"404"},{"url":"https://vuldb.com/?ctiid.225152","name":"https://vuldb.com/?ctiid.225152","refsource":"MISC","tags":["Third Party Advisory"],"title":"","mime":"text/plain","httpstatus":"429","archivestatus":"404"},{"url":"https://github.com/wp-plugins/broken-link-checker/commit/f30638869e281461b87548e40b517738b4350e47","name":"https://github.com/wp-plugins/broken-link-checker/commit/f30638869e281461b87548e40b517738b4350e47","refsource":"MISC","tags":["Patch"],"title":"Fix a CSRF/XSS vulnerability caused by not escaping the URL returned … · wp-plugins/broken-link-checker@f306388 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2015-10098","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-10098","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2015","cve_id":"10098","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"wpmudev","cpe5":"broken_link_checker","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2015-10098","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in Broken Link Checker Plugin up to 1.10.5 on WordPress. It has been rated as problematic. Affected by this issue is the function print_module_list/show_warnings_section_notice/status_text/ui_get_action_links. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.10.6 is able to address this issue. The name of the patch is f30638869e281461b87548e40b517738b4350e47. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225152."},{"lang":"deu","value":"Eine problematische Schwachstelle wurde in Broken Link Checker Plugin bis 1.10.5 für WordPress ausgemacht. Dies betrifft die Funktion print_module_list/show_warnings_section_notice/status_text/ui_get_action_links. Durch Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Ein Aktualisieren auf die Version 1.10.6 vermag dieses Problem zu lösen. Der Patch wird als f30638869e281461b87548e40b517738b4350e47 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross Site Scripting","cweId":"CWE-79"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Broken Link Checker Plugin","version":{"version_data":[{"version_affected":"=","version_value":"1.10.0"},{"version_affected":"=","version_value":"1.10.1"},{"version_affected":"=","version_value":"1.10.2"},{"version_affected":"=","version_value":"1.10.3"},{"version_affected":"=","version_value":"1.10.4"},{"version_affected":"=","version_value":"1.10.5"}]}}]}}]}},"references":{"reference_data":[{"url":"https://vuldb.com/?id.225152","refsource":"MISC","name":"https://vuldb.com/?id.225152"},{"url":"https://vuldb.com/?ctiid.225152","refsource":"MISC","name":"https://vuldb.com/?ctiid.225152"},{"url":"https://github.com/wp-plugins/broken-link-checker/commit/f30638869e281461b87548e40b517738b4350e47","refsource":"MISC","name":"https://github.com/wp-plugins/broken-link-checker/commit/f30638869e281461b87548e40b517738b4350e47"},{"url":"https://github.com/wp-plugins/broken-link-checker/releases/tag/1.10.6","refsource":"MISC","name":"https://github.com/wp-plugins/broken-link-checker/releases/tag/1.10.6"}]},"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer"}],"impact":{"cvss":[{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"},{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"},{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}]}},"nvd":{"publishedDate":"2023-04-08 09:15:00","lastModifiedDate":"2023-12-20 02:25:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:wpmudev:broken_link_checker:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.10.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}