2 May 2019

Vulnerability Details: Cross-Site Request Forgery (CSRF)/Cross-Site Scripting (XSS) in Pretty Links

The changelog for the latest version of Pretty Links is “Fixed some security issues”. Looking at the changes made we found that protection against cross-site request forgery (CSRF) was added for various actions that are restricted to users the “manage_options” capability (so Administrators). Those included the actions to create, update, and delete links handled by the plugin. We found that when creating a link you can also cause cross-site scripting (XSS) to happen, which isn’t normally a vulnerability for users with the “manage_options” capability, though should probably be fixed as well.

...


This post provides insights on a vulnerability in the WordPress plugin Pretty Links not discovered by us, where the discoverer hadn't provided the details needed for us to confirm the vulnerability while we were adding it to the data set for our service, so the rest of its contents are limited to subscribers of our service.

If you were using our service, you would have already been warned about this vulnerability if your website is vulnerable due to it. You can try out our service for free and then see the rest of the details of the vulnerability.

For existing customers, please log in to your account to view the rest of the contents of the post.


Plugin Security Scorecard Grade for Pretty Links

Checked on August 24, 2024
B

See issues causing the plugin to get less than A+ grade

Leave a Reply

Your email address will not be published. Required fields are marked *