CVE-2025-4047
WordPress vulnerability analysis and mitigation

Overview

The Broken Link Checker plugin for WordPress is vulnerable to unauthorized data access in versions up to and including 2.4.4. The vulnerability (CVE-2025-4047) was discovered due to a missing capability check on the ajaxfullstatus and ajaxdashboardstatus functions, which allows authenticated attackers with Subscriber-level access or higher to view the plugin's status (NVD).

Technical details

The vulnerability stems from insufficient authorization controls in the plugin's AJAX functions. The issue is classified as CWE-862 (Missing Authorization) with a CVSS v3.1 Base Score of 4.3 (MEDIUM) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. The vulnerability specifically affects the ajaxfullstatus and ajaxdashboardstatus functions in the plugin's core functionality (NVD, Wordfence).

Impact

The vulnerability allows authenticated users with Subscriber-level access or higher to view the plugin's status information, which should normally be restricted to users with higher privileges. This represents an unauthorized access to potentially sensitive plugin configuration data (NVD).

Mitigation and workarounds

The issue has been addressed in subsequent versions of the plugin. Users are advised to update their Broken Link Checker plugin to a version newer than 2.4.4 to mitigate this vulnerability (WordPress Trac).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management