漏洞描述: WordPress的Broken Link Notifier插件在1.3.0及之前的所有版本中存在服务器端请求伪造(SSRF)漏洞。该漏洞源于ajax_blinks()函数最终调用的check_url_status_code()函数未对用户提供的URL进行充分验证,使得未经认证的攻击者能够利用该漏洞发起对任意位置的Web请求。这种攻击可以用于查询和修改内部服务的信息,从而可能导致敏感数据泄露或服务中断。由于该漏洞不需要认证即可利用,且可以自动化执行,因此对使用该插件的WordPress网站构成了严重的安全威胁。受影响的用户应立即升级到1.3.1或更高版本以修复此漏洞。
info: name: WordPress Broken Link Notifier <1.3.1- Unauthenticated SSRF author: iamnoooob,pdresearch severity: high description: | The Broken Link Notifier plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.0 via the ajax_blinks() function which ultimately calls the check_url_status_code() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. remediation: Fixed in1.3.1. reference: - https://nvd.nist.gov/vuln/detail/CVE-2025-6851 - https://wpscan.com/vulnerability/CVE-2025-6851 - https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/broken-link-notifier/broken-link-notifier-130-unauthenticated-server-side-request-forgery metadata: verified:true max-request:2 publicwww-query:"/wp-content/plugins/broken-link-notifier/" fofa-query: body="blnotifier_front_end" tags: cve,cve2025,wp-plugin,wordpress,ssrf,oast,unauth,wpscan,broken-link-notifier