VYPR
Medium severity4.3NVD Advisory· Published Sep 20, 2025· Updated Apr 15, 2026

CVE-2025-9949

CVE-2025-9949

Description

The Internal Links Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.1. This is due to missing or incorrect nonce validation on the link deletion functionality in the process_bulk_action() function. This makes it possible for unauthenticated attackers to delete SEO links via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Internal Links Manager plugin for WordPress (≤3.0.1) lacks CSRF protection in its bulk link deletion, allowing unauthenticated attackers to trick admins into deleting SEO links.

Vulnerability

Overview The Internal Links Manager plugin for WordPress, up to version 3.0.1, is vulnerable to Cross-Site Request Forgery (CSRF) in its link deletion functionality. The root cause is missing or incorrect nonce validation within the process_bulk_action() function, which handles bulk operations on SEO links [1]. This CSRF flaw allows an attacker to forge requests that delete links without the administrator's consent.

Exploitation

Prerequisites Exploitation requires tricking a logged-in site administrator into performing an action, such as clicking a malicious link or visiting a crafted page. The attacker does not need authentication, as the forged request can be delivered via social engineering or embedded in other content. The vulnerability affects all plugin versions up to and including 3.0.1 [1].

Impact

If successfully exploited, an unauthenticated attacker can delete SEO links managed by the plugin. This could disrupt the site's internal linking structure, potentially harming user experience and search engine optimization (SEO) efforts. The plugin's description emphasizes the importance of internal links for improving UX and SEO, so deletion of these links could degrade site navigation and ranking signals [1].

Mitigation

As of the publication date, users should update the plugin to a version newer than 3.0.1 if available, or apply any security patches provided by the vendor. No longer maintained? vendor. Administrators should also be cautious of unsolicited links and consider using security best practices to prevent CSRF attacks.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.