CVE-2025-14063
Description
The SEO Links Interlinking plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'google_error' parameter in all versions up to, and including, 1.7.9.9.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS in the SEO Links Interlinking WordPress plugin via the google_error parameter, allowing unauthenticated attackers to inject arbitrary scripts.
The SEO Links Interlinking plugin for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) in all versions up to, and including, 1.7.9.9.1. The vulnerability exists because the plugin fails to properly sanitize input and escape output for the 'google_error' parameter, allowing injection of arbitrary web scripts [1].
An unauthenticated attacker can exploit this by crafting a malicious link that includes a google_error parameter containing JavaScript code. The attack requires user interaction, as the victim must be tricked into clicking the crafted link. The malicious script then executes in the context of the victim's browser session within the WordPress admin or public-facing pages where the parameter is reflected [1].
The impact is the execution of arbitrary scripts in the victim's browser, which can lead to session hijacking, credential theft, or defacement of the affected WordPress site. Since the plugin integrates with Google Search Console and manages internal links, a successful attack could potentially compromise administrative actions or sensitive data if the victim is an admin [1].
As of the publication date, a patched version (1.7.9.9.2 or later) is expected to be available. The vendor should be contacted for the latest fix. Users are advised to update immediately and consider disabling the plugin until patched. No workarounds are currently provided [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <=1.7.9.9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- plugins.trac.wordpress.org/browser/seo-links-interlinking/tags/1.7.5/scdata.phpnvd
- plugins.trac.wordpress.org/browser/seo-links-interlinking/tags/1.7.5/scdata.phpnvd
- plugins.trac.wordpress.org/browser/seo-links-interlinking/trunk/scdata.phpnvd
- plugins.trac.wordpress.org/browser/seo-links-interlinking/trunk/scdata.phpnvd
- plugins.trac.wordpress.org/changeset/3453347nvd
- wordpress.org/plugins/seo-links-interlinking/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/d71143d6-d477-4a63-8f99-f4cc8a590536nvd
News mentions
0No linked articles in our index yet.