CVE-2025-6838
BaseFortify
Publication date: 2025-07-11
Last updated on: 2025-07-15
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | broken-link-notifier | 1.3.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1236 | The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by a spreadsheet product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Broken Link Notifier plugin for WordPress has a CSV Injection vulnerability in all versions up to 1.3.0. Authenticated users with Contributor-level access or higher can insert malicious input into exported CSV files via broken links. When these CSV files are downloaded and opened on a local system with a vulnerable configuration, this can lead to code execution.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with Contributor-level access or higher to execute code on a local system when a maliciously crafted CSV file is opened. This could lead to unauthorized actions or compromise of the local system where the file is opened.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update the Broken Link Notifier plugin to a version later than 1.3.0 where the CSV Injection issue is fixed. Additionally, restrict Contributor-level and higher users from exporting CSV files until the update is applied, and educate users to be cautious when opening CSV files from this plugin to avoid code execution risks.